<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://www.cybereason.com/blog/threat-alert-aggressive-qakbot-campaign-and-the-black-basta-ransomware-group-targeting-u.s.-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Black%20Basta%20Threat%20Alert.png</image:loc><image:caption>BlackBastaThreatAlert</image:caption><image:title>BlackBastaThreatAlert</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-8.png</image:loc><image:caption>qakbot8</image:caption><image:title>qakbot8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-19.png</image:loc><image:caption>qakbot19</image:caption><image:title>qakbot19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-12.png</image:loc><image:caption>qakbot12</image:caption><image:title>qakbot12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-2.png</image:loc><image:caption>qakbot2</image:caption><image:title>qakbot2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-7.png</image:loc><image:caption>qakbot7</image:caption><image:title>qakbot7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-10.png</image:loc><image:caption>qakbot10</image:caption><image:title>qakbot10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-16.png</image:loc><image:caption>qakbot16</image:caption><image:title>qakbot16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-20.png</image:loc><image:caption>qakbot20</image:caption><image:title>qakbot20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-13.png</image:loc><image:caption>qakbot13</image:caption><image:title>qakbot13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-6.png</image:loc><image:caption>qakbot6</image:caption><image:title>qakbot6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-18.png</image:loc><image:caption>qakbot18</image:caption><image:title>qakbot18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-17.png</image:loc><image:caption>qakbot17</image:caption><image:title>qakbot17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-11.png</image:loc><image:caption>qakbot11</image:caption><image:title>qakbot11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-21.png</image:loc><image:caption>qakbot21</image:caption><image:title>qakbot21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-3.png</image:loc><image:caption>qakbot3</image:caption><image:title>qakbot3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-9.png</image:loc><image:caption>qakbot9</image:caption><image:title>qakbot9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-5.png</image:loc><image:caption>qakbot5</image:caption><image:title>qakbot5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CopyofCybereasonBlogHeroTemplate1</image:caption><image:title>CopyofCybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(33).png</image:loc><image:caption>blogposttext33</image:caption><image:title>blogposttext33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-4.png</image:loc><image:caption>qakbot4</image:caption><image:title>qakbot4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-14.png</image:loc><image:caption>qakbot14</image:caption><image:title>qakbot14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-1.png</image:loc><image:caption>qakbot1</image:caption><image:title>qakbot1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/qakbot-15.png</image:loc><image:caption>qakbot15</image:caption><image:title>qakbot15</image:title></image:image><lastmod>2023-04-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ridiculous-mistake-let-north-korea-steal-secret-u.s.-war-plans</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/WSJ.png</image:loc><image:caption>WSJ</image:caption><image:title>WSJ</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-to-survive-a-ransomware-attack-and-not-get-hit-again</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/forbes-logo.gif</image:loc><image:caption>forbeslogo</image:caption><image:title>forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2018-08-23</lastmod></url><url><loc>https://www.cybereason.com/resources/operation-soft-cell-a-worldwide-campaign-against-telecommunications-providers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(11).png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><lastmod>2019-06-25</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-named-the-fastest-growing-security-company</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_45592786-1024x391.jpg</image:loc><image:caption>shutterstock455927861024x391</image:caption><image:title>shutterstock455927861024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(42).png</image:loc><image:caption>blogposttext42</image:caption><image:title>blogposttext42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ex-employee-arrested-after-trying-to-sell-spyware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ISMG%20logo.png</image:loc><image:caption>ISMGlogo</image:caption><image:title>ISMGlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-07-24</lastmod></url><url><loc>https://www.cybereason.com/blog/cloud-authentication-a-guide-to-choosing-the-right-solution</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Orli%20Solomon.png</image:loc><image:caption>OrliSolomon</image:caption><image:title>OrliSolomon</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-28T090319.905.png</image:loc><image:caption>blogposttext20220928T090319905</image:caption><image:title>blogposttext20220928T090319905</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(16).png</image:loc><image:caption>CybereasonBlogTemplate16</image:caption><image:title>CybereasonBlogTemplate16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Sep-22-2022-07-39-42-71-PM.png</image:loc><image:caption>CaptureSep22202207394271PM</image:caption><image:title>CaptureSep22202207394271PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-09-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cut-the-fud-why-fear-uncertainty-and-doubt-is-harming-the-security-industry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/help-net-security.jpg</image:loc><image:caption>helpnetsecurity</image:caption><image:title>helpnetsecurity</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-08</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-can-nuclear-power-plants-be-hacked</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/107%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>107MALICIOUSLIFE</image:caption><image:title>107MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Andrew%20Ginter.png</image:loc><image:caption>AndrewGinter</image:caption><image:title>AndrewGinter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/economics-of-cybersecurity-ep-215.png</image:loc><image:caption>economicsofcybersecurityep215</image:caption><image:title>economicsofcybersecurityep215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(25).png</image:loc><image:caption>MaliciousLifeepisode25</image:caption><image:title>MaliciousLifeepisode25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/new-ebook-user-space-endpoint-data-collection-the-basis-for-powerful-unobtrusive-detection-and-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Blog-Post_User-Space_Header.png</image:loc><image:caption>BlogPostUserSpaceHeader</image:caption><image:title>BlogPostUserSpaceHeader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(64).png</image:loc><image:caption>blogposttext64</image:caption><image:title>blogposttext64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(74).png</image:loc><image:caption>blogposttext74</image:caption><image:title>blogposttext74</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2018-07-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/an-up-close-view-of-the-notorious-apt32-hacking-group-in-action</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Wired.png</image:loc><image:caption>Wired</image:caption><image:title>Wired</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/services/advanced-analysis</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Servicesv3.jpg</image:loc><image:caption>Servicesv3</image:caption><image:title>Servicesv3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ServiceSubPageHeader3.png</image:loc><image:caption>ServiceSubPageHeader3</image:caption><image:title>ServiceSubPageHeader3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Greenhouse%20Email/gray-grey-background-f2f2f2.png</image:loc><image:caption>graygreybackgroundf2f2f2</image:caption><image:title>graygreybackgroundf2f2f2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-01-08</lastmod></url><url><loc>https://www.cybereason.com/blog/love-your-enemies-before-you-destroy-them-hacking-for-good</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/hacking-for-good.jpeg</image:loc><image:caption>hackingforgood</image:caption><image:title>hackingforgood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/blog/cybersecurity-is-national-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Headshot%20(1)-1.jpg</image:loc><image:caption>Headshot11</image:caption><image:title>Headshot11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(19).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews19</image:caption><image:title>CopyofBLOGSOCIALSETNews19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113218.959.png</image:loc><image:caption>blogposttext20220920T113218959</image:caption><image:title>blogposttext20220920T113218959</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-09-02</lastmod></url><url><loc>https://www.cybereason.com/blog/cybersecurity-predictions-for-2015-detection-and-response-get-automated</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-05T074007.547.png</image:loc><image:caption>blogposttext20220805T074007547</image:caption><image:title>blogposttext20220805T074007547</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T075722.062.png</image:loc><image:caption>blogposttext20220725T075722062</image:caption><image:title>blogposttext20220725T075722062</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-hollywood-con-queen-pt2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-248-Card.png</image:loc><image:caption>MLEp248Card</image:caption><image:title>MLEp248Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-247-Card.png</image:loc><image:caption>MLEp247Card</image:caption><image:title>MLEp247Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-246-Card.png</image:loc><image:caption>MLEp246Card</image:caption><image:title>MLEp246Card</image:title></image:image><lastmod>2024-08-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-teams-up-with-google-cloud-for-cloud-native-xdr-solution</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Calcalist%20logo-4.png</image:loc><image:caption>Calcalistlogo4</image:caption><image:title>Calcalistlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-why-hacking-back-rarely-works</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_552355456-1.jpg</image:loc><image:caption>shutterstock5523554561</image:caption><image:title>shutterstock5523554561</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(7).png</image:loc><image:caption>CybereasonBlogTemplate7</image:caption><image:title>CybereasonBlogTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/category/videos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Copy%20of%20RYUK1.png</image:loc><image:caption>CopyofCopyofRYUK1</image:caption><image:title>CopyofCopyofRYUK1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusa-blog.png</image:loc><image:caption>medusablog</image:caption><image:title>medusablog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template%20(2).png</image:loc><image:caption>CybereasonVsTemplate2</image:caption><image:title>CybereasonVsTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ever-Evolving-sam-Curry-Card.png</image:loc><image:caption>EverEvolvingsamCurryCard</image:caption><image:title>EverEvolvingsamCurryCard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(124).png</image:loc><image:caption>blogposttext124</image:caption><image:title>blogposttext124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ever-evolving-israel-barak.png</image:loc><image:caption>everevolvingisraelbarak</image:caption><image:title>everevolvingisraelbarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(112).png</image:loc><image:caption>blogposttext112</image:caption><image:title>blogposttext112</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRXDR.png</image:loc><image:caption>CRXDR</image:caption><image:title>CRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template-2.png</image:loc><image:caption>CybereasonVsTemplate2</image:caption><image:title>CybereasonVsTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(19).png</image:loc><image:caption>blogposttext19</image:caption><image:title>blogposttext19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ryuk-ransomware-illus.png</image:loc><image:caption>ryukransomwareillus</image:caption><image:title>ryukransomwareillus</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(9)-1.png</image:loc><image:caption>CybereasonBlogTemplate91</image:caption><image:title>CybereasonBlogTemplate91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(41).png</image:loc><image:caption>blogposttext41</image:caption><image:title>blogposttext41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template.png</image:loc><image:caption>CybereasonVsTemplate</image:caption><image:title>CybereasonVsTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template-1.png</image:loc><image:caption>CybereasonVsTemplate1</image:caption><image:title>CybereasonVsTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Stephanie%20Ihezukwu%20Card.png</image:loc><image:caption>StephanieIhezukwuCard</image:caption><image:title>StephanieIhezukwuCard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template%20(1).png</image:loc><image:caption>CybereasonVsTemplate1</image:caption><image:title>CybereasonVsTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(3).png</image:loc><image:caption>Vs3</image:caption><image:title>Vs3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5).png</image:loc><image:caption>CybereasonBlogTemplate5</image:caption><image:title>CybereasonBlogTemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ever-Evolving-JANCA-Cover.png</image:loc><image:caption>EverEvolvingJANCACover</image:caption><image:title>EverEvolvingJANCACover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ever-Evolving-Rachel-Tobac-Card.png</image:loc><image:caption>EverEvolvingRachelTobacCard</image:caption><image:title>EverEvolvingRachelTobacCard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malop-blog.png</image:loc><image:caption>Malopblog</image:caption><image:title>Malopblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Darkside-blog.png</image:loc><image:caption>Darksideblog</image:caption><image:title>Darksideblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(4).png</image:loc><image:caption>blogposttext4</image:caption><image:title>blogposttext4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/katie-nickels-ever-evolving-card.png</image:loc><image:caption>katienickelseverevolvingcard</image:caption><image:title>katienickelseverevolvingcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ever-Evolving-YSA-Cover.png</image:loc><image:caption>EverEvolvingYSACover</image:caption><image:title>EverEvolvingYSACover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RYUK1%20(1).png</image:loc><image:caption>RYUK11</image:caption><image:title>RYUK11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jake-williams-card.png</image:loc><image:caption>jakewilliamscard</image:caption><image:title>jakewilliamscard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yellow%20background%20%2B%20Texture%20Sample%20(1).png</image:loc><image:caption>YellowbackgroundTextureSample1</image:caption><image:title>YellowbackgroundTextureSample1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20vs.%20SolarWinds%20Attack.png</image:loc><image:caption>CybereasonvsSolarWindsAttack</image:caption><image:title>CybereasonvsSolarWindsAttack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-blog-card.png</image:loc><image:caption>egregorblogcard</image:caption><image:title>egregorblogcard</image:title></image:image><lastmod>2021-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/watch-cybereason-ciso-israel-barak-discuss-the-changing-economics-of-cyber-crime-with-cso-online</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_367342985.jpg</image:loc><image:caption>shutterstock367342985</image:caption><image:title>shutterstock367342985</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2019-01-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-releases-a-free-fix-for-serious-log4shell-vulnerability-in-apache-log4j</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Beta%20News%20logo-Dec-14-2021-03-12-23-04-AM.png</image:loc><image:caption>BetaNewslogoDec14202103122304AM</image:caption><image:title>BetaNewslogoDec14202103122304AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/-year-of-the-defender-questions-answered</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-29T100914.455.png</image:loc><image:caption>blogposttext20220929T100914455</image:caption><image:title>blogposttext20220929T100914455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Untitled%20design%20(67).png</image:loc><image:caption>Untitleddesign67</image:caption><image:title>Untitleddesign67</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-the-cloudflare-data-leak-is-serious-but-needs-to-be-looked-at-in-context</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-5.png</image:loc><image:caption>Untitleddesign5</image:caption><image:title>Untitleddesign5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/product/the-definitive-guide-cybereason-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20XDR%20Definitive%20Guide.png</image:loc><image:caption>CybereasonXDRDefinitiveGuide</image:caption><image:title>CybereasonXDRDefinitiveGuide</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Future%20SOC%20Effectiveness.png</image:loc><image:caption>FutureSOCEffectiveness</image:caption><image:title>FutureSOCEffectiveness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-data-management.png</image:loc><image:caption>cybereasonxdrdatamanagement</image:caption><image:title>cybereasonxdrdatamanagement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-tops-gartners-ranking-of-endpoint-detection-and-response-solutions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-28</lastmod></url><url><loc>https://www.cybereason.com/blog/vb2020-anchor-bazar-and-the-trickbot-connection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/fingerprint-hero-blue-green.png</image:loc><image:caption>fingerprintherobluegreen</image:caption><image:title>fingerprintherobluegreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinese-threat-actors-have-been-compromising-telecom-networks-for-years-investigation-finds</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo-Aug-04-2021-05-47-42-70-PM.png</image:loc><image:caption>TechRepubliclogoAug04202105474270PM</image:caption><image:title>TechRepubliclogoAug04202105474270PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-04</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs.-conti-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Lior-R-HS-1.png</image:loc><image:caption>LiorRHS1</image:caption><image:title>LiorRHS1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-3.png</image:loc><image:caption>contiblog3</image:caption><image:title>contiblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-5.png</image:loc><image:caption>contiblog5</image:caption><image:title>contiblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-4.png</image:loc><image:caption>contiblog4</image:caption><image:title>contiblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-16.png</image:loc><image:caption>contiblog16</image:caption><image:title>contiblog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-13.png</image:loc><image:caption>contiblog13</image:caption><image:title>contiblog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-15.png</image:loc><image:caption>contiblog15</image:caption><image:title>contiblog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-6.png</image:loc><image:caption>contiblog6</image:caption><image:title>contiblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-18.png</image:loc><image:caption>contiblog18</image:caption><image:title>contiblog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-1.png</image:loc><image:caption>contiblog1</image:caption><image:title>contiblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-8.png</image:loc><image:caption>contiblog8</image:caption><image:title>contiblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-10.png</image:loc><image:caption>contiblog10</image:caption><image:title>contiblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-12.png</image:loc><image:caption>contiblog12</image:caption><image:title>contiblog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-11.png</image:loc><image:caption>contiblog11</image:caption><image:title>contiblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-9.png</image:loc><image:caption>contiblog9</image:caption><image:title>contiblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-7.png</image:loc><image:caption>contiblog7</image:caption><image:title>contiblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-17.png</image:loc><image:caption>contiblog17</image:caption><image:title>contiblog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/conti-blog-14.png</image:loc><image:caption>contiblog14</image:caption><image:title>contiblog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template.png</image:loc><image:caption>CybereasonVsTemplate</image:caption><image:title>CybereasonVsTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vs-ransomware.png</image:loc><image:caption>vsransomware</image:caption><image:title>vsransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-acquires-empow-to-enhance-its-xdr-features</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Solutions%20Review%20logo.png</image:loc><image:caption>SolutionsReviewlogo</image:caption><image:title>SolutionsReviewlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/owners-urged-to-update-apple-devices-quickly-but-stay-calm-over-security-flaw</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20News%20logo-Aug-22-2022-05-53-03-60-PM.png</image:loc><image:caption>YahooNewslogoAug22202205530360PM</image:caption><image:title>YahooNewslogoAug22202205530360PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-08-22</lastmod></url><url><loc>https://www.cybereason.com/blog/watch-where-you-browse-the-fallout-exploit-kit-stays-active</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb%207.png</image:loc><image:caption>wwyb7</image:caption><image:title>wwyb7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb-1.png</image:loc><image:caption>wwyb1</image:caption><image:title>wwyb1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb%2013.png</image:loc><image:caption>wwyb13</image:caption><image:title>wwyb13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb%2012.png</image:loc><image:caption>wwyb12</image:caption><image:title>wwyb12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb%202.png</image:loc><image:caption>wwyb2</image:caption><image:title>wwyb2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb%2010.png</image:loc><image:caption>wwyb10</image:caption><image:title>wwyb10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb%206.png</image:loc><image:caption>wwyb6</image:caption><image:title>wwyb6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-124.png</image:loc><image:caption>image124</image:caption><image:title>image124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb%2011.png</image:loc><image:caption>wwyb11</image:caption><image:title>wwyb11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb%204.png</image:loc><image:caption>wwyb4</image:caption><image:title>wwyb4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb%203.png</image:loc><image:caption>wwyb3</image:caption><image:title>wwyb3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb%208.png</image:loc><image:caption>wwyb8</image:caption><image:title>wwyb8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb%205.png</image:loc><image:caption>wwyb5</image:caption><image:title>wwyb5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wwyb%209.png</image:loc><image:caption>wwyb9</image:caption><image:title>wwyb9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><lastmod>2023-05-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/potential-for-russian-cyberattack-against-u.s.-not-to-be-taken-lightly</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/VentureBeat%20logo-3.png</image:loc><image:caption>VentureBeatlogo3</image:caption><image:title>VentureBeatlogo3</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-the-two-actor-theory-behind-the-notpetya-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Two-Actors.png</image:loc><image:caption>TwoActors</image:caption><image:title>TwoActors</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-24.jpg</image:loc><image:caption>Untitleddesign24</image:caption><image:title>Untitleddesign24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-01-25</lastmod></url><url><loc>https://www.cybereason.com/blog/ttp-briefing-q3-2025</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q3%202025/test.png</image:loc><image:caption>test</image:caption><image:title>test</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/Intrusion%20Path.png</image:loc><image:caption>IntrusionPath</image:caption><image:title>IntrusionPath</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q3%202025/dwell-time_Q32025.png</image:loc><image:caption>dwelltimeQ32025</image:caption><image:title>dwelltimeQ32025</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chrome%20Extension%20Campaign.png</image:loc><image:caption>ChromeExtensionCampaign</image:caption><image:title>ChromeExtensionCampaign</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ivanti-threat-alert-blog-featured.png</image:loc><image:caption>ivantithreatalertblogfeatured</image:caption><image:title>ivantithreatalertblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q3%202025/Untitled%20presentation%20(3).png</image:loc><image:caption>Untitledpresentation3</image:caption><image:title>Untitledpresentation3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q3%202025/chart.png</image:loc><image:caption>chart</image:caption><image:title>chart</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q3%202025/incidenttype-ot_Q32025-1.png</image:loc><image:caption>incidenttypeotQ320251</image:caption><image:title>incidenttypeotQ320251</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q3%202025/MFABypass_Q32025.png</image:loc><image:caption>MFABypassQ32025</image:caption><image:title>MFABypassQ32025</image:title></image:image><lastmod>2025-11-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/4-steps-organizations-can-take-to-increase-diversity-in-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-Aug-27-2021-12-14-05-47-AM.png</image:loc><image:caption>DarkReadinglogoAug27202112140547AM</image:caption><image:title>DarkReadinglogoAug27202112140547AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-08-27</lastmod></url><url><loc>https://www.cybereason.com/blog/ryuk-ransomware-mitigation-and-defense</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV-redefined-blog-post-text.png</image:loc><image:caption>NGAVredefinedblogposttext</image:caption><image:title>NGAVredefinedblogposttext</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/maranda-hs.jpg</image:loc><image:caption>marandahs</image:caption><image:title>marandahs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-preventid-1500px.png</image:loc><image:caption>crowlshowcasepreventid1500px</image:caption><image:title>crowlshowcasepreventid1500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/heres-everything-you-need-to-know-about-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/TechCityNews.png</image:loc><image:caption>TechCityNews</image:caption><image:title>TechCityNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/why-utility-providers-will-benefit-from-the-nsas-cyber-mission-force</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_222798229.jpg</image:loc><image:caption>shutterstock222798229</image:caption><image:title>shutterstock222798229</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(30).png</image:loc><image:caption>blogposttext30</image:caption><image:title>blogposttext30</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/-how-new-threats-curb-the-effectiveness-of-antivirus-and-next-generation-antivirus</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Untitled%20design%20(86).jpg</image:loc><image:caption>Untitleddesign86</image:caption><image:title>Untitleddesign86</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-15</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-research-failure-to-detect-escalation-of-privileges-by-common-monitoring-tools</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(81).png</image:loc><image:caption>blogposttext81</image:caption><image:title>blogposttext81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(34).png</image:loc><image:caption>blogposttext34</image:caption><image:title>blogposttext34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/3.dont_see_road-844x391.jpg</image:loc><image:caption>3dontseeroad844x391</image:caption><image:title>3dontseeroad844x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs.-ransomexx-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-2.png</image:loc><image:caption>Ransomexxblog2</image:caption><image:title>Ransomexxblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vs-ransomware.png</image:loc><image:caption>vsransomware</image:caption><image:title>vsransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-5.png</image:loc><image:caption>Ransomexxblog5</image:caption><image:title>Ransomexxblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-7.png</image:loc><image:caption>Ransomexxblog7</image:caption><image:title>Ransomexxblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(3).png</image:loc><image:caption>Vs3</image:caption><image:title>Vs3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-1.png</image:loc><image:caption>Ransomexxblog1</image:caption><image:title>Ransomexxblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-6.png</image:loc><image:caption>Ransomexxblog6</image:caption><image:title>Ransomexxblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-12.png</image:loc><image:caption>Ransomexxblog12</image:caption><image:title>Ransomexxblog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-11.png</image:loc><image:caption>Ransomexxblog11</image:caption><image:title>Ransomexxblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-3.png</image:loc><image:caption>Ransomexxblog3</image:caption><image:title>Ransomexxblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-9.png</image:loc><image:caption>Ransomexxblog9</image:caption><image:title>Ransomexxblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-8.png</image:loc><image:caption>Ransomexxblog8</image:caption><image:title>Ransomexxblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yellow%20background%20%2B%20Texture%20Sample%20(1).png</image:loc><image:caption>YellowbackgroundTextureSample1</image:caption><image:title>YellowbackgroundTextureSample1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-4.png</image:loc><image:caption>Ransomexxblog4</image:caption><image:title>Ransomexxblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-8.2.png</image:loc><image:caption>Ransomexxblog82</image:caption><image:title>Ransomexxblog82</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomexx-blog-10.png</image:loc><image:caption>Ransomexxblog10</image:caption><image:title>Ransomexxblog10</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-newest-customer-is-david-lloyd-leisure</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-07-19</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-august-25th-2022-leveraging-mitre-attck-to-bolster-your-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/cody-circle-headshot.png</image:loc><image:caption>codycircleheadshot</image:caption><image:title>codycircleheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/aoibh-circle-hs-min.png</image:loc><image:caption>aoibhcirclehsmin</image:caption><image:title>aoibhcirclehsmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-many-hackers-does-it-take-to-change-a-light-bulb</loc><image:image><image:loc>https://www.cybereason.com/hubfs/forbes-logo-11.gif</image:loc><image:caption>forbeslogo11</image:caption><image:title>forbeslogo11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-excels-in-the-2022-mitre-attck-evaluations-100-prevention-visibility-and-real-time-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(65).png</image:loc><image:caption>blogposttext65</image:caption><image:title>blogposttext65</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/meg-oleary-600px.jpg</image:loc><image:caption>megoleary600px</image:caption><image:title>megoleary600px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-mitre-23-lp-featured-1.png</image:loc><image:caption>crmitre23lpfeatured1</image:caption><image:title>crmitre23lpfeatured1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capturey-2.png</image:loc><image:caption>Capturey2</image:caption><image:title>Capturey2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-06-03</lastmod></url><url><loc>https://www.cybereason.com/blog/us-north-korea-bolton-nuclear-weapons-talks-trump</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_578167276.jpg</image:loc><image:caption>shutterstock578167276</image:caption><image:title>shutterstock578167276</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/136%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>136MALICIOUSLIFE</image:caption><image:title>136MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-rsa-conference-2023.png</image:loc><image:caption>cybereasonrsaconference2023</image:caption><image:title>cybereasonrsaconference2023</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-05-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-rolls-out-enhanced-defenders-league-partner-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Buzz%20logo-1.jpg</image:loc><image:caption>ChannelBuzzlogo1</image:caption><image:title>ChannelBuzzlogo1</image:title></image:image><lastmod>2021-07-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-rewriting-the-rules-of-attack-against-cybercrime</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/venturefizzlogo.png</image:loc><image:caption>venturefizzlogo</image:caption><image:title>venturefizzlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/international-womens-day-culture-add-over-culture-fit-as-a-catalyst-for-diversity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/IWD%20blog%20Marisa%20Ianelli.png</image:loc><image:caption>IWDblogMarisaIanelli</image:caption><image:title>IWDblogMarisaIanelli</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CybereasonBlogHeroTemplate</image:caption><image:title>CybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94)-1.png</image:loc><image:caption>blogposttext941</image:caption><image:title>blogposttext941</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Marisa%20Ianelli.png</image:loc><image:caption>MarisaIanelli</image:caption><image:title>MarisaIanelli</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-03-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/five-of-the-most-dangerous-ransomops-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITWeb%20logo-3.png</image:loc><image:caption>ITWeblogo3</image:caption><image:title>ITWeblogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-10-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sc-product-reviews-endpoint-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-3.png</image:loc><image:caption>SCMagazinelogo3</image:caption><image:title>SCMagazinelogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-07-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iranian-hacking-group-discovered-targeting-aerospace-and-telecom</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bloomberg%20News%20logo-2.png</image:loc><image:caption>BloombergNewslogo2</image:caption><image:title>BloombergNewslogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/blog/the-cybereason-malop-achieving-operation-centric-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(110).png</image:loc><image:caption>blogposttext110</image:caption><image:title>blogposttext110</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-03T064719.647.png</image:loc><image:caption>blogposttext20220803T064719647</image:caption><image:title>blogposttext20220803T064719647</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/malop-explained.png</image:loc><image:caption>malopexplained</image:caption><image:title>malopexplained</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/leveraging-cybereason-dfir-to-contain-attacks-in-minutes</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(81).png</image:loc><image:caption>blogposttext81</image:caption><image:title>blogposttext81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-cranford-author.png</image:loc><image:caption>jjcranfordauthor</image:caption><image:title>jjcranfordauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-05-16T094933.342.png</image:loc><image:caption>blogposttext20220516T094933342</image:caption><image:title>blogposttext20220516T094933342</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T065715.064.png</image:loc><image:caption>blogposttext20221006T065715064</image:caption><image:title>blogposttext20221006T065715064</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/mnuchins-private-equity-fund-raises-2.5-billion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NY%20Times%20logo.png</image:loc><image:caption>NYTimeslogo</image:caption><image:title>NYTimeslogo</image:title></image:image><lastmod>2021-09-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecuritys-inconvenient-truth-the-nation-state-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-2.png</image:loc><image:caption>Databreachtodaylogo2</image:caption><image:title>Databreachtodaylogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-10-20</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-one-of-bostons-best-places-to-work-by-built-in-boston</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-01-05</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-crypto-ag-the-greatest-espionage-operation-ever-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(3).png</image:loc><image:caption>Maliciouslifepodcast3</image:caption><image:title>Maliciouslifepodcast3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(7).png</image:loc><image:caption>Maliciouslifepodcast7</image:caption><image:title>Maliciouslifepodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2022-02-14</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alert-multi-stage-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/12-hot-security-start-ups-you-need-to-know</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/network_world.jpg</image:loc><image:caption>networkworld</image:caption><image:title>networkworld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-head-to-head-why-does-cybereason-anti-ransomware-win-over-sentinelone</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8994.jpg</image:loc><image:caption>IMG8994</image:caption><image:title>IMG8994</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(20)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews201</image:caption><image:title>CopyofBLOGSOCIALSETNews201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(8)-1.png</image:loc><image:caption>CybereasonBlogTemplate81</image:caption><image:title>CybereasonBlogTemplate81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-2.png</image:loc><image:caption>CybereasonBlogTemplate32</image:caption><image:title>CybereasonBlogTemplate32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-11-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-hack-hacking-tools-to-hack-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Securityweek-logo-4.jpg</image:loc><image:caption>Securityweeklogo4</image:caption><image:title>Securityweeklogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/blog/inside-the-darkside-ransomware-attack-on-colonial-pipeline</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(2)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews21</image:caption><image:title>CopyofBLOGSOCIALSETNews21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-06T123240.080.png</image:loc><image:caption>blogposttext20220706T123240080</image:caption><image:title>blogposttext20220706T123240080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-06T070615.090.png</image:loc><image:caption>blogposttext20220906T070615090</image:caption><image:title>blogposttext20220906T070615090</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-partners-with-arm-to-pioneer-protection-for-the-iot-ecosystem</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-10-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/security-pros-face-sanctions-if-they-help-ransomware-victims-pay</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-2.png</image:loc><image:caption>ComputerWeeklylogo2</image:caption><image:title>ComputerWeeklylogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-10-20</lastmod></url><url><loc>https://www.cybereason.com/blog/fileless-malware-wmi</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Blog-Post_Seven-Signs_Thumb2.jpg</image:loc><image:caption>BlogPostSevenSignsThumb2</image:caption><image:title>BlogPostSevenSignsThumb2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-05-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecurity-industry-braces-for-tighter-visa-rules</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CSO.png</image:loc><image:caption>CSO</image:caption><image:title>CSO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/t-mobile-confirms-data-breach-but-damage-remains-unclear</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes%20logo-4.png</image:loc><image:caption>Forbeslogo4</image:caption><image:title>Forbeslogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-08-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinas-cyber-espionage-focus-intellectual-property-theft</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-May-17-2022-02-37-36-75-PM.png</image:loc><image:caption>CSOMagazinelogoMay17202202373675PM</image:caption><image:title>CSOMagazinelogoMay17202202373675PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-05-17</lastmod></url><url><loc>https://www.cybereason.com/blog/defensive-gap-assessment-with-mitre-attck</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dani-wood.png</image:loc><image:caption>daniwood</image:caption><image:title>daniwood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mitre.png</image:loc><image:caption>Mitre</image:caption><image:title>Mitre</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-extends-endpoint-protection-with-mobile-offering</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN-Logo-8.png</image:loc><image:caption>CRNLogo8</image:caption><image:title>CRNLogo8</image:title></image:image><lastmod>2020-04-28</lastmod></url><url><loc>https://www.cybereason.com/services/incident-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--platform-02-gradient.jpg</image:loc><image:caption>crbgheroplatform02gradient</image:caption><image:title>crbgheroplatform02gradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-icon--black.svg</image:loc><image:caption>crlogoiconblack</image:caption><image:title>crlogoiconblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-spine-bg--endpoint-protection-clean-d.jpg</image:loc><image:caption>crplatformspinebgendpointprotectioncleand</image:caption><image:title>crplatformspinebgendpointprotectioncleand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-spine-bg--posture-incident-management-d.jpg</image:loc><image:caption>crplatformspinebgpostureincidentmanagementd</image:caption><image:title>crplatformspinebgpostureincidentmanagementd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/incident-response-datasheet-2023-cover.png</image:loc><image:caption>incidentresponsedatasheet2023cover</image:caption><image:title>incidentresponsedatasheet2023cover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/fbi-pegs-2020-cybercrime-costs-at-4-billion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(40).png</image:loc><image:caption>blogposttext40</image:caption><image:title>blogposttext40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-1.png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FBI%20Cybercrime-blog.png</image:loc><image:caption>FBICybercrimeblog</image:caption><image:title>FBICybercrimeblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/beast-ransomware-blog-featured.png</image:loc><image:caption>beastransomwareblogfeatured</image:caption><image:title>beastransomwareblogfeatured</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-logout4shell-a-digital-vaccine-for-log4shell</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(3).png</image:loc><image:caption>MaliciousLifeTemplate3</image:caption><image:title>MaliciousLifeTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(26)-2.png</image:loc><image:caption>CybereasonBlogTemplate262</image:caption><image:title>CybereasonBlogTemplate262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Headshot%20(2).jpg</image:loc><image:caption>Headshot2</image:caption><image:title>Headshot2</image:title></image:image><lastmod>2021-12-27</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-taps-security-industry-veteran-greg-day-as-global-field-ciso</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Defendercon_LP_no%20time.jpg</image:loc><image:caption>1200x627DefenderconLPnotime</image:caption><image:title>1200x627DefenderconLPnotime</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(35).png</image:loc><image:caption>blogposttext35</image:caption><image:title>blogposttext35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(12).png</image:loc><image:caption>blogposttext12</image:caption><image:title>blogposttext12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-03-08</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-2024-mitre-results</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2025-01-16</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-partners-with-dubais-oxygen-to-expand-services-in-the-middle-east-and-north-africa-markets-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-02-18</lastmod></url><url><loc>https://www.cybereason.com/blog/labs-hajime-variant-messes-with-iptables</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T074703.175.png</image:loc><image:caption>blogposttext20220627T074703175</image:caption><image:title>blogposttext20220627T074703175</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/hajimeimage3-1.png</image:loc><image:caption>hajimeimage31</image:caption><image:title>hajimeimage31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/hajime_feature.png</image:loc><image:caption>hajimefeature</image:caption><image:title>hajimefeature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(121).png</image:loc><image:caption>blogposttext121</image:caption><image:title>blogposttext121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/HAIJMEScreen-Shot2--1.png</image:loc><image:caption>HAIJMEScreenShot21</image:caption><image:title>HAIJMEScreenShot21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/remote-is-the-new-norm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Headshot%20(1)-1.jpg</image:loc><image:caption>Headshot11</image:caption><image:title>Headshot11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WFH-Blog-B.png</image:loc><image:caption>WFHBlogB</image:caption><image:title>WFHBlogB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4).png</image:loc><image:caption>MaliciousLifeepisode4</image:caption><image:title>MaliciousLifeepisode4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2020-03-23</lastmod></url><url><loc>https://www.cybereason.com/blog/vault-7-leaks-long-term-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MATAN.jpeg</image:loc><image:caption>MATAN</image:caption><image:title>MATAN</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(15).png</image:loc><image:caption>BLOGImagesTemplatev215</image:caption><image:title>BLOGImagesTemplatev215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1).png</image:loc><image:caption>BLOGPOST1</image:caption><image:title>BLOGPOST1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/vault_seven_feature.jpg</image:loc><image:caption>vaultsevenfeature</image:caption><image:title>vaultsevenfeature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-12-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/wannacry-makes-me-want-to-cry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/NetworkWorld.png</image:loc><image:caption>NetworkWorld</image:caption><image:title>NetworkWorld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/product/cybereason-xdr-10x-productivity-boost-from-unified-investigations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/XDR_10X.png</image:loc><image:caption>XDR10X</image:caption><image:title>XDR10X</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/4%20O365.jpg</image:loc><image:caption>4O365</image:caption><image:title>4O365</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10XFaster.png</image:loc><image:caption>10XFaster</image:caption><image:title>10XFaster</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/6%20phishing%20details.jpg</image:loc><image:caption>6phishingdetails</image:caption><image:title>6phishingdetails</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2%20visualize%20how%20it%20happened-1.jpg</image:loc><image:caption>2visualizehowithappened1</image:caption><image:title>2visualizehowithappened1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3%20details%20OKTA.jpg</image:loc><image:caption>3detailsOKTA</image:caption><image:title>3detailsOKTA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(4).png</image:loc><image:caption>blogposttext4</image:caption><image:title>blogposttext4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1%20mimiKatz.jpg</image:loc><image:caption>1mimiKatz</image:caption><image:title>1mimiKatz</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/5%20phishing%20endpoint.jpg</image:loc><image:caption>5phishingendpoint</image:caption><image:title>5phishingendpoint</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/resources/optimizing-coverage-to-bolster-your-defense/webinar/global/113023</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/MITRE-Tidal-Webinar-11.30.23.jpg</image:loc><image:caption>MITRETidalWebinar113023</image:caption><image:title>MITRETidalWebinar113023</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-02-26</lastmod></url><url><loc>https://www.cybereason.com/blog/expert-support-class-action</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-252-featured.png</image:loc><image:caption>MLEp252featured</image:caption><image:title>MLEp252featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7).png</image:loc><image:caption>MaliciousLifeepisode7</image:caption><image:title>MaliciousLifeepisode7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(14).png</image:loc><image:caption>BLOGImagesTemplatev214</image:caption><image:title>BLOGImagesTemplatev214</image:title></image:image><lastmod>2025-04-10</lastmod></url><url><loc>https://www.cybereason.com/blog/research/molerats-apt-new-malware-and-techniques-in-middle-east-espionage-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/molerats-blog-2b.png</image:loc><image:caption>moleratsblog2b</image:caption><image:title>moleratsblog2b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/molerats-blog-2a.png</image:loc><image:caption>moleratsblog2a</image:caption><image:title>moleratsblog2a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/molerats-pt2-blog-card.png</image:loc><image:caption>moleratspt2blogcard</image:caption><image:title>moleratspt2blogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vs-ransomware.png</image:loc><image:caption>vsransomware</image:caption><image:title>vsransomware</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/research/report-ransomware-attacks-and-the-true-cost-to-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/true%20cost%20to%20business%201200x628.png</image:loc><image:caption>truecosttobusiness1200x628</image:caption><image:title>truecosttobusiness1200x628</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-04-14</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-announces-100-million-investment-by-softbank</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/the-cybereason-advantage-why-cybereason-was-named-a-visionary-in-the-2021-gartner-magic-quadrant-for-epp</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gartner_mq_NO_CTA.jpg</image:loc><image:caption>gartnermqNOCTA</image:caption><image:title>gartnermqNOCTA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/meg-oleary-600px.jpg</image:loc><image:caption>megoleary600px</image:caption><image:title>megoleary600px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(65).png</image:loc><image:caption>blogposttext65</image:caption><image:title>blogposttext65</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-01-05</lastmod></url><url><loc>https://www.cybereason.com/resources/cybereason-vs-darkside-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/darkside%20webinar%20(2)-1.png</image:loc><image:caption>darksidewebinar21</image:caption><image:title>darksidewebinar21</image:title></image:image><lastmod>2021-07-07</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-names-osamu-yamano-president-of-its-japanese-operation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-chaes-malware-targets-latin-american-e-commerce-users</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Week%20logo-Nov-18-2020-03-51-35-96-PM.png</image:loc><image:caption>SecurityWeeklogoNov18202003513596PM</image:caption><image:title>SecurityWeeklogoNov18202003513596PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-11-18</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-privacy-hunger-games-change-the-rules</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO_51.png</image:loc><image:caption>CISO51</image:caption><image:title>CISO51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/samthomas-0.jpeg</image:loc><image:caption>samthomas0</image:caption><image:title>samthomas0</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><lastmod>2022-02-14</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-volt-typhoon</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/John_Lambert.jpg</image:loc><image:caption>JohnLambert</image:caption><image:title>JohnLambert</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>140MALICIOUSLIFE</image:caption><image:title>140MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-229-Card.png</image:loc><image:caption>MLEp229Card</image:caption><image:title>MLEp229Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/economics-of-cybersecurity-ep-215.png</image:loc><image:caption>economicsofcybersecurityep215</image:caption><image:title>economicsofcybersecurityep215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-01-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-evolution-of-destructive-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/cyberscoop.png</image:loc><image:caption>cyberscoop</image:caption><image:title>cyberscoop</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/evaluating-xdr-against-edr-siem-and-soar-solutions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(9).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews9</image:caption><image:title>CopyofBLOGSOCIALSETNews9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FIN7_BadUSB.png</image:loc><image:caption>FIN7BadUSB</image:caption><image:title>FIN7BadUSB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/yossi-hs.png</image:loc><image:caption>yossihs</image:caption><image:title>yossihs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(22)-1.png</image:loc><image:caption>CybereasonBlogTemplate221</image:caption><image:title>CybereasonBlogTemplate221</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/to-protect-enterprise-data-secure-the-code</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CIO-Today2.png</image:loc><image:caption>CIOToday2</image:caption><image:title>CIOToday2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-moving-to-the-cloud-dont-forget-hardware-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories%20(1).png</image:loc><image:caption>CISOStories1</image:caption><image:title>CISOStories1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO_51.png</image:loc><image:caption>CISO51</image:caption><image:title>CISO51</image:title></image:image><lastmod>2022-02-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/superdrug-denies-data-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CW_Logo-hero.jpg</image:loc><image:caption>CWLogohero</image:caption><image:title>CWLogohero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-08-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/leadher-emmy-linder-global-head-of-operations-and-chief-of-staff-at-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/venturefizzlogo.png</image:loc><image:caption>venturefizzlogo</image:caption><image:title>venturefizzlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-security-firm-wins-100m-softbank-backing</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/FT.jpg</image:loc><image:caption>FT</image:caption><image:title>FT</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-launches-newest-version-of-its-award-winning-threat-hunting-solution</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/organisations-pay-over-1m-in-ransom-for-ransomware-attacks-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Singapore%20Business%20Review%20logo-1.jpg</image:loc><image:caption>SingaporeBusinessReviewlogo1</image:caption><image:title>SingaporeBusinessReviewlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-06-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/two-top-vc-firms-just-teamed-up-for-startup-speed-dating-with-big-businesses</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-hacking-stock-markets-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(30).png</image:loc><image:caption>MaliciousLifeepisode30</image:caption><image:title>MaliciousLifeepisode30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><lastmod>2022-10-04</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-inside-operation-flyhook-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ray%20Pompon.png</image:loc><image:caption>RayPompon</image:caption><image:title>RayPompon</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(2)-1.png</image:loc><image:caption>MaliciousLifeTemplate21</image:caption><image:title>MaliciousLifeTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/135%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>135MALICIOUSLIFE</image:caption><image:title>135MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2021-11-08</lastmod></url><url><loc>https://www.cybereason.com/consulting/experts/derek-rieck</loc><lastmod>2025-08-19</lastmod></url><url><loc>https://www.cybereason.com/resources/new-ursnif-variant-turns-to-cryptocurrency-as-banks-become-more-secure</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(1)-1.png</image:loc><image:caption>pastedimage011</image:caption><image:title>pastedimage011</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-05-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/mac-malware-getting-much-worse-how-to-protect-yourself</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/TomsGuide.jpg</image:loc><image:caption>TomsGuide</image:caption><image:title>TomsGuide</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-targeting-japan-may-be-concealing-other-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/TheHill.png</image:loc><image:caption>TheHill</image:caption><image:title>TheHill</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-security-from-scratch-incident-response-on-a-budget</loc><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories.png</image:loc><image:caption>CISOStories</image:caption><image:title>CISOStories</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(20).png</image:loc><image:caption>CISOStoriestemplate20</image:caption><image:title>CISOStoriestemplate20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Monasteri.png</image:loc><image:caption>SamMonasteri</image:caption><image:title>SamMonasteri</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-we-know-about-the-ransomware-attack-on-a-critical-u.s.-pipeline</loc><image:image><image:loc>https://www.cybereason.com/hubfs/NPR%20logo.png</image:loc><image:caption>NPRlogo</image:caption><image:title>NPRlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-05-10</lastmod></url><url><loc>https://www.cybereason.com/resources/protecting-you-from-hafnium</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/HAFNUM-Webinar-March-24-Social-Image.png</image:loc><image:caption>HAFNUMWebinarMarch24SocialImage</image:caption><image:title>HAFNUMWebinarMarch24SocialImage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2021-03-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-taxpayers-targeted-in-netwire-remcos-trojan-attack-wave</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo-4.png</image:loc><image:caption>ZDNetlogo4</image:caption><image:title>ZDNetlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-03-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/dhs-warns-russia-could-launch-cyberattack-on-us</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Intelligent%20CIO%20logo.png</image:loc><image:caption>IntelligentCIOlogo</image:caption><image:title>IntelligentCIOlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-alert-warns-of-tax-season-cyberscam</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC%20logo.png</image:loc><image:caption>CNBClogo</image:caption><image:title>CNBClogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-03-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/as-ukraine-prepares-for-cyberattacks-officials-warn-of-ransomware-in-disguise</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Wall_Street_Journal%20logo.png</image:loc><image:caption>WallStreetJournallogo</image:caption><image:title>WallStreetJournallogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-02-03</lastmod></url><url><loc>https://www.cybereason.com/blog/its-october-yes-national-cybersecurity-awareness-month-still-matters</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Sky-Dark-Blue-CAM.png</image:loc><image:caption>SkyDarkBlueCAM</image:caption><image:title>SkyDarkBlueCAM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/two-sharepoint-on-prem-vulnerabilities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(1).png</image:loc><image:caption>BLOGImagesTemplatev21</image:caption><image:title>BLOGImagesTemplatev21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_SonicWall.png</image:loc><image:caption>BLOGImagesSonicWall</image:caption><image:title>BLOGImagesSonicWall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(24).png</image:loc><image:caption>BLOGImagesTemplatev224</image:caption><image:title>BLOGImagesTemplatev224</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><lastmod>2025-07-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-execs-strengthen-mssp-msp-security-partner-focus</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-1.png</image:loc><image:caption>MSSPAlertlogo1</image:caption><image:title>MSSPAlertlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-03-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uber-reveals-cover-up-of-hack-affecting-57m-riders-drivers-3</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Associated_Press_logo.png</image:loc><image:caption>AssociatedPresslogo</image:caption><image:title>AssociatedPresslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/services/technical-services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/OPTIMIZE_SECURITY_OPS_CR_ICONS-20.svg</image:loc><image:caption>OPTIMIZESECURITYOPSCRICONS20</image:caption><image:title>OPTIMIZESECURITYOPSCRICONS20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/chart-icon-check.svg</image:loc><image:caption>charticoncheck</image:caption><image:title>charticoncheck</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/247PROTECTION_THREATHUNTING_CR_ICONS-19.svg</image:loc><image:caption>247PROTECTIONTHREATHUNTINGCRICONS19</image:caption><image:title>247PROTECTIONTHREATHUNTINGCRICONS19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/chart-icon-dash.svg</image:loc><image:caption>charticondash</image:caption><image:title>charticondash</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/MAGNIFY_CR_ICONS-45.svg</image:loc><image:caption>MAGNIFYCRICONS45</image:caption><image:title>MAGNIFYCRICONS45</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ATTACK_GOAL_CR_ICONS-33.svg</image:loc><image:caption>ATTACKGOALCRICONS33</image:caption><image:title>ATTACKGOALCRICONS33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--platform-02-gradient.jpg</image:loc><image:caption>crbgheroplatform02gradient</image:caption><image:title>crbgheroplatform02gradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-100px.png</image:loc><image:caption>crchartcheckmark100px</image:caption><image:title>crchartcheckmark100px</image:title></image:image><lastmod>2023-06-15</lastmod></url><url><loc>https://www.cybereason.com/blog/dfir-demystified-understanding-digital-forensics-incident-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Renaissance.png</image:loc><image:caption>Renaissance</image:caption><image:title>Renaissance</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Unified%20MALOP.png</image:loc><image:caption>UnifiedMALOP</image:caption><image:title>UnifiedMALOP</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-05-16T094933.342.png</image:loc><image:caption>blogposttext20220516T094933342</image:caption><image:title>blogposttext20220516T094933342</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(34).png</image:loc><image:caption>blogposttext34</image:caption><image:title>blogposttext34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-cranford-author.png</image:loc><image:caption>jjcranfordauthor</image:caption><image:title>jjcranfordauthor</image:title></image:image><lastmod>2022-04-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/profile-on-cybereasons-ciso-israel-barak</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Defence-Online.png</image:loc><image:caption>DefenceOnline</image:caption><image:title>DefenceOnline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-nocturnus-researchers-discover-widescale-hacking-operation-targeting-financial-institutions-in-the-united-states-and-europe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-12-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-mystery-of-cicada-3301</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(14).png</image:loc><image:caption>MaliciousLifeepisode14</image:caption><image:title>MaliciousLifeepisode14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MaliciousLife.png</image:loc><image:caption>MaliciousLife</image:caption><image:title>MaliciousLife</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(7).png</image:loc><image:caption>Maliciouslifepodcast7</image:caption><image:title>Maliciouslifepodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-announces-its-strategic-advisory-board-to-support-its-rapid-growth-and-expansion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-lodrina-cherne-to-lead-digital-forensics-lab-at-national-cyber-crime-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-and-google-cloud-announce-strategic-partnership</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN%20logo-Oct-13-2021-02-48-51-64-AM.png</image:loc><image:caption>CRNlogoOct13202102485164AM</image:caption><image:title>CRNlogoOct13202102485164AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/resources/ransomware-mdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/ICC-Video-Ransomware-MDR.png</image:loc><image:caption>ICCVideoRansomwareMDR</image:caption><image:title>ICCVideoRansomwareMDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-28</lastmod></url><url><loc>https://www.cybereason.com/blog/ai/ml-as-a-security-team-force-multiplier</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(2)-1.png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(93).png</image:loc><image:caption>blogposttext93</image:caption><image:title>blogposttext93</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T112612.527.png</image:loc><image:caption>blogposttext20220913T112612527</image:caption><image:title>blogposttext20220913T112612527</image:title></image:image><lastmod>2022-09-14</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-chooses-oracle-cloud-infrastructure-to-boost-customer-defenses-against-cybersecurity-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/lodrina-cherne</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/lodrina-hs-hex.png</image:loc><image:caption>lodrinahshex</image:caption><image:title>lodrinahshex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU-BLM.png</image:loc><image:caption>UbUBLM</image:caption><image:title>UbUBLM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-in-the-news-israel-barak-talks-to-threatpost-about-how-black-markets-are-offering-attackers-new-business-opportunities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_23897395.jpg</image:loc><image:caption>shutterstock23897395</image:caption><image:title>shutterstock23897395</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(41).png</image:loc><image:caption>blogposttext41</image:caption><image:title>blogposttext41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(100).png</image:loc><image:caption>blogposttext100</image:caption><image:title>blogposttext100</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-warns-organizations-against-the-rise-in-cyber-attacks-using-icedid-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-01-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/spooked-by-cyber-extortion-spike-businesses-stockpile-bitcoin</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CIO-Today-Logo.jpg</image:loc><image:caption>CIOTodayLogo</image:caption><image:title>CIOTodayLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/lessons-learned-from-the-hacking-team-getting-hacked</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blank-avatar.png</image:loc><image:caption>blankavatar</image:caption><image:title>blankavatar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_2354342501-1000x391.jpg</image:loc><image:caption>shutterstock23543425011000x391</image:caption><image:title>shutterstock23543425011000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/webinar.png</image:loc><image:caption>webinar</image:caption><image:title>webinar</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/colonial-pipelines-ransomware-attack-sparks-emergency-declaration</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ThreatPost%20logo-2.png</image:loc><image:caption>ThreatPostlogo2</image:caption><image:title>ThreatPostlogo2</image:title></image:image><lastmod>2021-05-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/colonial-pipeline-may-have-to-pay-fine-of-nearly-1-million</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-Jun-14-2022-01-33-11-66-AM.png</image:loc><image:caption>DatabreachtodaylogoJun14202201331166AM</image:caption><image:title>DatabreachtodaylogoJun14202201331166AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-06-14</lastmod></url><url><loc>https://www.cybereason.com/deep-2018-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/LOGO-Web-Horizontal-Mono.png</image:loc><image:caption>LOGOWebHorizontalMono</image:caption><image:title>LOGOWebHorizontalMono</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/square%20headshots/Garry_Kasparov_Chess_sqr.jpg</image:loc><image:caption>GarryKasparovChesssqr</image:caption><image:title>GarryKasparovChesssqr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/Lotem.jpg</image:loc><image:caption>Lotem</image:caption><image:title>Lotem</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/Partner%20Logos/Google_Cloud.png</image:loc><image:caption>GoogleCloud</image:caption><image:title>GoogleCloud</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/John_Halamka_trim.jpg</image:loc><image:caption>JohnHalamkatrim</image:caption><image:title>JohnHalamkatrim</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/Rachel_Tobac_trim.jpg</image:loc><image:caption>RachelTobactrim</image:caption><image:title>RachelTobactrim</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/deep-2018-crowd.jpg</image:loc><image:caption>deep2018crowd</image:caption><image:title>deep2018crowd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eddavis.jpg</image:loc><image:caption>eddavis</image:caption><image:title>eddavis</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/Partner%20Logos/Deloitte.png</image:loc><image:caption>Deloitte</image:caption><image:title>Deloitte</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/Benjamin_Delpy_BW.jpg</image:loc><image:caption>BenjaminDelpyBW</image:caption><image:title>BenjaminDelpyBW</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/Partner%20Logos/Sprint.png</image:loc><image:caption>Sprint</image:caption><image:title>Sprint</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/Michael_Lewis.jpg</image:loc><image:caption>MichaelLewis</image:caption><image:title>MichaelLewis</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/Emmet_Cohen.jpg</image:loc><image:caption>EmmetCohen</image:caption><image:title>EmmetCohen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/Wendy_Nather_trim.jpg</image:loc><image:caption>WendyNathertrim</image:caption><image:title>WendyNathertrim</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/David_Rose.jpg</image:loc><image:caption>DavidRose</image:caption><image:title>DavidRose</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/2018_06_06_Deep_Animation.gif</image:loc><image:caption>20180606DeepAnimation</image:caption><image:title>20180606DeepAnimation</image:title></image:image><lastmod>2019-01-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/valak-targets-microsoft-exchange-servers-to-steal-enterprise-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet-1.jpg</image:loc><image:caption>ZDNet1</image:caption><image:title>ZDNet1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-05-29</lastmod></url><url><loc>https://www.cybereason.com/blog/how-the-ransomware-gangs-stay-one-step-ahead</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(42).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews42</image:caption><image:title>CopyofBLOGSOCIALSETNews42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085148.693.png</image:loc><image:caption>blogposttext20221018T085148693</image:caption><image:title>blogposttext20221018T085148693</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(50).png</image:loc><image:caption>blogposttext50</image:caption><image:title>blogposttext50</image:title></image:image><lastmod>2022-02-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/facebook-branded-poster-child-for-mistrust-after-419-million-users-records-leak</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mirror.png</image:loc><image:caption>Mirror</image:caption><image:title>Mirror</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/resources/cutting-through-the-epp-noise-a-future-proof-strategy-0</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Waterfall_Texture_1920x1080-1.jpg</image:loc><image:caption>WaterfallTexture1920x10801</image:caption><image:title>WaterfallTexture1920x10801</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-12-18</lastmod></url><url><loc>https://www.cybereason.com/consulting/experts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/derek-rieck.png</image:loc><image:caption>derekrieck</image:caption><image:title>derekrieck</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dave-LI.jpg</image:loc><image:caption>DaveLI</image:caption><image:title>DaveLI</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/michael-quinn.webp</image:loc><image:caption>michaelquinn</image:caption><image:title>michaelquinn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ben-demonte.jpg</image:loc><image:caption>bendemonte</image:caption><image:title>bendemonte</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/denman-headshot.png</image:loc><image:caption>denmanheadshot</image:caption><image:title>denmanheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/5.jpeg</image:loc><image:caption>5</image:caption><image:title>5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DurrantProfilePic2025.png</image:loc><image:caption>DurrantProfilePic2025</image:caption><image:title>DurrantProfilePic2025</image:title></image:image><lastmod>2025-08-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-and-intel-partner</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Jan-13-2021-02-40-34-62-PM.png</image:loc><image:caption>InfosecurityMagazinelogoJan13202102403462PM</image:caption><image:title>InfosecurityMagazinelogoJan13202102403462PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-01-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/8-lessons-from-the-garmin-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/techbeacon.png</image:loc><image:caption>techbeacon</image:caption><image:title>techbeacon</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-09-03</lastmod></url><url><loc>https://www.cybereason.com/blog/video-the-cios-role-in-establishing-a-cyber-resilience-strategy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113218.959.png</image:loc><image:caption>blogposttext20220920T113218959</image:caption><image:title>blogposttext20220920T113218959</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_MG_2575-Edit_small.jpg</image:loc><image:caption>MG2575Editsmall</image:caption><image:title>MG2575Editsmall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(41).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews41</image:caption><image:title>CopyofBLOGSOCIALSETNews41</image:title></image:image><lastmod>2021-09-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-hires-hussam-sidani-to-lead-middle-east-and-turkey-operations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Gulf%20Business%20logo-1.png</image:loc><image:caption>GulfBusinesslogo1</image:caption><image:title>GulfBusinesslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hand-in-hand-privacy-and-transparency</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/report-details-massive-chinese-ip-theft</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Washington%20Times%20logo.png</image:loc><image:caption>WashingtonTimeslogo</image:caption><image:title>WashingtonTimeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-100th-episode-special</loc><image:image><image:loc>https://www.cybereason.com/hubfs/95%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>95MALICIOUSLIFE</image:caption><image:title>95MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/maggie-macalpine.png</image:loc><image:caption>maggiemacalpine</image:caption><image:title>maggiemacalpine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(12).png</image:loc><image:caption>MaliciousLifeepisode12</image:caption><image:title>MaliciousLifeepisode12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-ransomware-attackers-dont-take-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(18).png</image:loc><image:caption>MaliciousLifeepisode18</image:caption><image:title>MaliciousLifeepisode18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>140MALICIOUSLIFE</image:caption><image:title>140MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ken%20Westin.png</image:loc><image:caption>KenWestin</image:caption><image:title>KenWestin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-226-Card.png</image:loc><image:caption>MLEp226Card</image:caption><image:title>MLEp226Card</image:title></image:image><lastmod>2021-12-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-steps-up-channel-leadership-to-boost-partner-profitability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRNtv%20logo-3.png</image:loc><image:caption>CRNtvlogo3</image:caption><image:title>CRNtvlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-endpoint-detection-and-response-edr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Endpoint%20Detection%20Response.jpg</image:loc><image:caption>EndpointDetectionResponse</image:caption><image:title>EndpointDetectionResponse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-02-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iranian-hackers-abuse-dropbox-in-cyberattacks-against-aerospace-and-telecom-firms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Hacker%20News%20logo.jpg</image:loc><image:caption>TheHackerNewslogo</image:caption><image:title>TheHackerNewslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/press/ensign-infosecurity-and-cybereason-partner-to-provide-managed-detection-and-response-mdr-services-to-mutual-customers-in-asia-pacific-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-01-28</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-earns-a-five-star-rating-in-sc-labs-endpoint-security-product-review</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-07-10</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-newest-honeypot-trapped-hackers-infiltrating-critical-infrastructure-networks-to-carry-out-multistage-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-06-12</lastmod></url><url><loc>https://www.cybereason.com/blog/ever-evolving-israel-barak-on-running-remote-soc-ops</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/alert-fatigue-the-silent-epidemic-featured-blog.png</image:loc><image:caption>alertfatiguethesilentepidemicfeaturedblog</image:caption><image:title>alertfatiguethesilentepidemicfeaturedblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ever-evolving-israel-barak.png</image:loc><image:caption>everevolvingisraelbarak</image:caption><image:title>everevolvingisraelbarak</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/blog/cybersecurity-accountability-regulation-your-opinion-matters-</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-15T085736.357.png</image:loc><image:caption>blogposttext20220915T085736357</image:caption><image:title>blogposttext20220915T085736357</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Meridith%20Levinson.png</image:loc><image:caption>MeridithLevinson</image:caption><image:title>MeridithLevinson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(111).png</image:loc><image:caption>blogposttext111</image:caption><image:title>blogposttext111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T071527.904.png</image:loc><image:caption>blogposttext20221006T071527904</image:caption><image:title>blogposttext20221006T071527904</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-10-06</lastmod></url><url><loc>https://www.cybereason.com/blog/hafnium-response-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/HAFNIUM%20Response.png</image:loc><image:caption>HAFNIUMResponse</image:caption><image:title>HAFNIUMResponse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-how-cybereason-is-going-fill-your-mind-and-stomach-at-the-rsa-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/San-Fran-01-1024x300.png</image:loc><image:caption>SanFran011024x300</image:caption><image:title>SanFran011024x300</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113218.959.png</image:loc><image:caption>blogposttext20220920T113218959</image:caption><image:title>blogposttext20220920T113218959</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-in-the-news-yonatan-striem-amit-talks-to-dark-reading-scmagazine</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(26)-2.png</image:loc><image:caption>CybereasonBlogTemplate262</image:caption><image:title>CybereasonBlogTemplate262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_413053837-1000x391.jpg</image:loc><image:caption>shutterstock4130538371000x391</image:caption><image:title>shutterstock4130538371000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4).png</image:loc><image:caption>MaliciousLifeepisode4</image:caption><image:title>MaliciousLifeepisode4</image:title></image:image><lastmod>2018-12-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/scammers-combine-the-black-basta-ransomware-linked-to-a-notorious-cybercriminal-syndicate-with-qakbot</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bloomberg%20News%20logo-Dec-12-2022-05-16-24-7281-PM.png</image:loc><image:caption>BloombergNewslogoDec1220220516247281PM</image:caption><image:title>BloombergNewslogoDec1220220516247281PM</image:title></image:image><lastmod>2022-12-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/six-russians-charged-over-notpetya-and-other-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-1.png</image:loc><image:caption>ComputerWeeklylogo1</image:caption><image:title>ComputerWeeklylogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-10-20</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-which-approach-wins-compliance-or-risk</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Mark%20Burnette.png</image:loc><image:caption>MarkBurnette</image:caption><image:title>MarkBurnette</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><lastmod>2022-01-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/one-in-seven-nasdaq-100-companies-ranked-as-highly-susceptible-to-a-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IT%20Pro%20Today%20logo.png</image:loc><image:caption>ITProTodaylogo</image:caption><image:title>ITProTodaylogo</image:title></image:image><lastmod>2021-09-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-week-in-review-operation-soft-cell</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Council%20on%20Foreign%20Relations.png</image:loc><image:caption>CouncilonForeignRelations</image:caption><image:title>CouncilonForeignRelations</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2019-07-01</lastmod></url><url><loc>https://www.cybereason.com/blog/what-smbs-need-to-know-about-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(40).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews40</image:caption><image:title>CopyofBLOGSOCIALSETNews40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(85).png</image:loc><image:caption>blogposttext85</image:caption><image:title>blogposttext85</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(61).png</image:loc><image:caption>blogposttext61</image:caption><image:title>blogposttext61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/what-are-adversary-emulation-plans</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AEP-Blog-Image-1.png</image:loc><image:caption>AEPBlogImage1</image:caption><image:title>AEPBlogImage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dani-wood.png</image:loc><image:caption>daniwood</image:caption><image:title>daniwood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/aep-blog-hero-1.png</image:loc><image:caption>aepbloghero1</image:caption><image:title>aepbloghero1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/labs-ransomware-looks-to-strike-it-rich-by-targeting-shared-network-drives-cloud-backup-services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(3).png</image:loc><image:caption>Vs3</image:caption><image:title>Vs3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/backup_feature.jpg</image:loc><image:caption>backupfeature</image:caption><image:title>backupfeature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Uri%20Sternfeld.jpeg</image:loc><image:caption>UriSternfeld</image:caption><image:title>UriSternfeld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template-1.png</image:loc><image:caption>CybereasonBlogTemplate1</image:caption><image:title>CybereasonBlogTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-02-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/suspected-chinese-hackers-took-advantage-of-microsoft-exchange-vulnerability-to-steal-call-records</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cyberscoop%20logo-Aug-04-2021-05-42-28-56-PM.png</image:loc><image:caption>CyberscooplogoAug04202105422856PM</image:caption><image:title>CyberscooplogoAug04202105422856PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-08-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/largest-ever-1.3tbps-ddos-attack-includes-embedded-ransom-demands</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/securityweek.png</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-03-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-leverage-facebook-dropbox-to-spy-on-egypt-palestinians</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cyberscoop%20logo.png</image:loc><image:caption>Cyberscooplogo</image:caption><image:title>Cyberscooplogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-12-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-max-headroom-signal-hijack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/74%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>74MALICIOUSLIFE</image:caption><image:title>74MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/theres-no-kill-switch-in-massive-malware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CNN-Money.png</image:loc><image:caption>CNNMoney</image:caption><image:title>CNNMoney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/prometei-botnet-exploits-exchange-server-bugs-to-grow</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Apr-23-2021-01-42-03-03-AM.png</image:loc><image:caption>InfosecurityMagazinelogoApr23202101420303AM</image:caption><image:title>InfosecurityMagazinelogoApr23202101420303AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/star-self-assessment.png</image:loc><image:caption>starselfassessment</image:caption><image:title>starselfassessment</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/collateral/certifications/avtest-approved-corporate-endpoint-protection-cert.png</image:loc><image:caption>avtestapprovedcorporateendpointprotectioncert</image:caption><image:title>avtestapprovedcorporateendpointprotectioncert</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-feature__flex--shape-collage.png</image:loc><image:caption>crbgfeatureflexshapecollage</image:caption><image:title>crbgfeatureflexshapecollage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/certifications/iso-27017.png</image:loc><image:caption>iso27017</image:caption><image:title>iso27017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/soc2-logo.png</image:loc><image:caption>soc2logo</image:caption><image:title>soc2logo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/certifications/DataPrivacyFrameworkLogo.png</image:loc><image:caption>DataPrivacyFrameworkLogo</image:caption><image:title>DataPrivacyFrameworkLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/certifications/iso-27018.png</image:loc><image:caption>iso27018</image:caption><image:title>iso27018</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/iso-certified.png</image:loc><image:caption>isocertified</image:caption><image:title>isocertified</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2025-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-extends-feature-support-for-linux</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CopyofCybereasonBlogHeroTemplate</image:caption><image:title>CopyofCybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ai-potential-cybersecurity-featured.png</image:loc><image:caption>aipotentialcybersecurityfeatured</image:caption><image:title>aipotentialcybersecurityfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(15)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews151</image:caption><image:title>CopyofBLOGSOCIALSETNews151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-01-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/after-hiatus-in-the-wild-mac-backdoors-are-suddenly-back</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/arstechnica_thumb-1.png</image:loc><image:caption>arstechnicathumb1</image:caption><image:title>arstechnicathumb1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/lockheed-martin-invests-in-threat-detection-firm-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-nocturnus-research-team-discovers-spike-in-betabot-malware-infections</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-10-05</lastmod></url><url><loc>https://www.cybereason.com/blog/choose-the-right-endpoint-sensor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-cranford-author.png</image:loc><image:caption>jjcranfordauthor</image:caption><image:title>jjcranfordauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(18).png</image:loc><image:caption>CybereasonBlogTemplate18</image:caption><image:title>CybereasonBlogTemplate18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(116).png</image:loc><image:caption>blogposttext116</image:caption><image:title>blogposttext116</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3)-2.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews32</image:caption><image:title>CopyofBLOGSOCIALSETNews32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2023-06-16</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-fred-cohen-the-godfather-of-computer-viruses-ml-b-side</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-1.png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-245-Card.png</image:loc><image:caption>MLEp245Card</image:caption><image:title>MLEp245Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/blog/four-ways-xdr-optimizes-your-security-stack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-02T094421.274.png</image:loc><image:caption>blogposttext20220602T094421274</image:caption><image:title>blogposttext20220602T094421274</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(63).png</image:loc><image:caption>blogposttext63</image:caption><image:title>blogposttext63</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-03T064719.647.png</image:loc><image:caption>blogposttext20220803T064719647</image:caption><image:title>blogposttext20220803T064719647</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-03-30</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-expands-its-senior-management-team</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-7.jpg</image:loc><image:caption>Untitleddesign7</image:caption><image:title>Untitleddesign7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Defendercon_LP_no%20time.jpg</image:loc><image:caption>1200x627DefenderconLPnotime</image:caption><image:title>1200x627DefenderconLPnotime</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(12).png</image:loc><image:caption>blogposttext12</image:caption><image:title>blogposttext12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/zoom-isnt-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Medium-1.png</image:loc><image:caption>Medium1</image:caption><image:title>Medium1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/techtargets-search-security-looks-at-how-cybereason-uses-data-analytics-to-protect-enterprises</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-learn-why-chasing-iocs-fails-to-detect-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_301789454.jpg</image:loc><image:caption>shutterstock301789454</image:caption><image:title>shutterstock301789454</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-operation-aurora-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/54%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>54MALICIOUSLIFE</image:caption><image:title>54MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/government</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-malicious-life-blog-home--featured.jpg</image:loc><image:caption>crmaliciouslifebloghomefeatured</image:caption><image:title>crmaliciouslifebloghomefeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-11-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-discovers-global-botnet-campaign-leveraging-microsoft-exchange-vulnerability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tahawul%20Tech%20logo.jpg</image:loc><image:caption>TahawulTechlogo</image:caption><image:title>TahawulTechlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-gozi-part-2-thief-in-law</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/60%20-%20MALICIOUS%20LIFE%20(1).png</image:loc><image:caption>60MALICIOUSLIFE1</image:caption><image:title>60MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/132%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>132MALICIOUSLIFE1</image:caption><image:title>132MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-announces-unified-threat-hunting-and-investigation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/headshot.jpeg</image:loc><image:caption>headshot</image:caption><image:title>headshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(119).png</image:loc><image:caption>blogposttext119</image:caption><image:title>blogposttext119</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><lastmod>2023-04-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/four-reasons-to-implement-an-xdr-solution-today</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechX%20Media%20logo-1.jpg</image:loc><image:caption>TechXMedialogo1</image:caption><image:title>TechXMedialogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-10-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-raises-275-million-led-by-steven-mnuchins-vc-fund</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Calcalist%20logo-1.png</image:loc><image:caption>Calcalistlogo1</image:caption><image:title>Calcalistlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-07-15</lastmod></url><url><loc>https://www.cybereason.com/company/who-we-are</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-02.png</image:loc><image:caption>crbgwhyinspektuswireframe02</image:caption><image:title>crbgwhyinspektuswireframe02</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/email-banners/Owl-Head-RSA-2.png</image:loc><image:caption>OwlHeadRSA2</image:caption><image:title>OwlHeadRSA2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-03.png</image:loc><image:caption>crbgwhyinspektuswireframe03</image:caption><image:title>crbgwhyinspektuswireframe03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2024-03-08</lastmod></url><url><loc>https://www.cybereason.com/blog/heart-of-cyber-darkness-how-i-became-a-defender</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/heart-of-cyber-darkness.png</image:loc><image:caption>heartofcyberdarkness</image:caption><image:title>heartofcyberdarkness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hacker-attempts-to-poison-florida-citys-water-supply</loc><image:image><image:loc>https://www.cybereason.com/hubfs/TechNewsWorld%20logo-1.png</image:loc><image:caption>TechNewsWorldlogo1</image:caption><image:title>TechNewsWorldlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-02-23</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/sdr-product-team</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/email-banners/Owl-Head-RSA-2.png</image:loc><image:caption>OwlHeadRSA2</image:caption><image:title>OwlHeadRSA2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/bridging-th-gap-blog-featured.png</image:loc><image:caption>bridgingthgapblogfeatured</image:caption><image:title>bridgingthgapblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-03-22</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-north-american-expansion-with-several-strategic-hires</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-02-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/data-breaches-dont-blame-security-teams-blame-lack-of-context</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-totok-part-3-becoming-a-spyware-superpower</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chris-Bingb.jpg</image:loc><image:caption>ChrisBingb</image:caption><image:title>ChrisBingb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-241-Card.png</image:loc><image:caption>MLEp241Card</image:caption><image:title>MLEp241Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/73%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>73MALICIOUSLIFE</image:caption><image:title>73MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinese-apt-group-winnti-stole-trade-secrets-in-years-long-undetected-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-May-09-2022-03-16-54-60-PM.png</image:loc><image:caption>CSOMagazinelogoMay09202203165460PM</image:caption><image:title>CSOMagazinelogoMay09202203165460PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/blog/how-cybereason-keeps-false-positive-rates-low</loc><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(23).png</image:loc><image:caption>BLOGImagesTemplatev223</image:caption><image:title>BLOGImagesTemplatev223</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_275504303-1000x391.jpg</image:loc><image:caption>shutterstock2755043031000x391</image:caption><image:title>shutterstock2755043031000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-alert-emotet-targeting-japanese-organizations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Mar-07-2022-04-50-24-41-PM.png</image:loc><image:caption>image2Mar07202204502441PM</image:caption><image:title>image2Mar07202204502441PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Mar-07-2022-04-45-29-22-PM.png</image:loc><image:caption>image3Mar07202204452922PM</image:caption><image:title>image3Mar07202204452922PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-2.jpg</image:loc><image:caption>image52</image:caption><image:title>image52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CopyofCybereasonBlogHeroTemplate1</image:caption><image:title>CopyofCybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Mar-07-2022-04-51-47-81-PM.png</image:loc><image:caption>image1Mar07202204514781PM</image:caption><image:title>image1Mar07202204514781PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Mar-07-2022-04-52-41-08-PM.png</image:loc><image:caption>image6Mar07202204524108PM</image:caption><image:title>image6Mar07202204524108PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Mar-07-2022-04-49-38-50-PM.png</image:loc><image:caption>image4Mar07202204493850PM</image:caption><image:title>image4Mar07202204493850PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(33).png</image:loc><image:caption>blogposttext33</image:caption><image:title>blogposttext33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-shifting-to-the-cloud</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware-shifting-to-cloud.png</image:loc><image:caption>Ransomwareshiftingtocloud</image:caption><image:title>Ransomwareshiftingtocloud</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-05T144829.712.png</image:loc><image:caption>blogposttext20220705T144829712</image:caption><image:title>blogposttext20220705T144829712</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(108).png</image:loc><image:caption>blogposttext108</image:caption><image:title>blogposttext108</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2023-02-14</lastmod></url><url><loc>https://www.cybereason.com/resources/deadringer-exposing-chinese-threat-actors-targeting-major-telcos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/deadringer-webinar-on-demand-card.png</image:loc><image:caption>deadringerwebinarondemandcard</image:caption><image:title>deadringerwebinarondemandcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-08-12</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-great-firewall-of-china-pt.-2-ciscos-trial</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-248-Card.png</image:loc><image:caption>MLEp248Card</image:caption><image:title>MLEp248Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/87%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>87MALICIOUSLIFE</image:caption><image:title>87MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-247-Card.png</image:loc><image:caption>MLEp247Card</image:caption><image:title>MLEp247Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-receives-the-only-best-buy-rating-from-sc-media-in-its-2020-endpoint-security-product-test</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/nasa-hack-exposes-space-agency-staffs-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BBC_News.svg-1.png</image:loc><image:caption>BBCNewssvg1</image:caption><image:title>BBCNewssvg1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2018-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-brutal-kangaroo-shows-even-air-gapped-networks-are-vulnerable-to-attackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MATAN.jpeg</image:loc><image:caption>MATAN</image:caption><image:title>MATAN</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_SonicWall.png</image:loc><image:caption>BLOGImagesSonicWall</image:caption><image:title>BLOGImagesSonicWall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(9).png</image:loc><image:caption>BLOGImagesTemplatev29</image:caption><image:title>BLOGImagesTemplatev29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_664776781.jpg</image:loc><image:caption>shutterstock664776781</image:caption><image:title>shutterstock664776781</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-is-nso-evil-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7)-1.png</image:loc><image:caption>MaliciousLifeepisode71</image:caption><image:title>MaliciousLifeepisode71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/rising-endpoint-security-star-cybereason-raises-200m-eyes-ipo</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN-Logo-3.png</image:loc><image:caption>CRNLogo3</image:caption><image:title>CRNLogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2019-08-06</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-synnex-corporation-partner-to-end-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-synnex-1.png</image:loc><image:caption>cybereasonsynnex1</image:caption><image:title>cybereasonsynnex1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Shai.png</image:loc><image:caption>Shai</image:caption><image:title>Shai</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/marriott-hack-reaction-its-likely-that-every-living-human-has-been-hacked</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict-Logo-4.jpg</image:loc><image:caption>VerdictLogo4</image:caption><image:title>VerdictLogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-12-03</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-a-cisos-nightmare-israel-baron-on-railway-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode.png</image:loc><image:caption>MaliciousLifeepisode</image:caption><image:title>MaliciousLifeepisode</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(23).png</image:loc><image:caption>MaliciousLifeepisode23</image:caption><image:title>MaliciousLifeepisode23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(2).png</image:loc><image:caption>MaliciousLifeepisode2</image:caption><image:title>MaliciousLifeepisode2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Israel_Baron.jpg</image:loc><image:caption>IsraelBaron</image:caption><image:title>IsraelBaron</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><lastmod>2022-08-15</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereasons-principal-security-researcher-amit-serper-is-first-in-world-to-discover-a-killswitch-to-stop-notpetya-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-head-to-head-dont-follow-the-crwd</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T134316.545.png</image:loc><image:caption>blogposttext20220914T134316545</image:caption><image:title>blogposttext20220914T134316545</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-06T070615.090.png</image:loc><image:caption>blogposttext20220906T070615090</image:caption><image:title>blogposttext20220906T070615090</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(8)-1.png</image:loc><image:caption>CybereasonBlogTemplate81</image:caption><image:title>CybereasonBlogTemplate81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-yellow-bg--top-badge.png</image:loc><image:caption>crlogoyellowbgtopbadge</image:caption><image:title>crlogoyellowbgtopbadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE%20ATT&amp;CK%20Real%20Time%20Detections.png</image:loc><image:caption>MITREATTCKRealTimeDetections</image:caption><image:title>MITREATTCKRealTimeDetections</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-01-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereasons-new-game-changers-tier-brings-bigger-resale-margins</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Pro%20Logo.jpg</image:loc><image:caption>ChannelProLogo</image:caption><image:title>ChannelProLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-silk-road-the-amazon-of-drugs-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(17).png</image:loc><image:caption>MaliciousLifeepisode17</image:caption><image:title>MaliciousLifeepisode17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-07-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-company-spotted-a-security-breach.-then-investigators-found-this-new-mysterious-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo-Oct-13-2021-03-02-24-92-AM.png</image:loc><image:caption>ZDNetlogoOct13202103022492AM</image:caption><image:title>ZDNetlogoOct13202103022492AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-offers-small-businesses-tips-on-protecting-themselves-from-ransomware-attacks-as-part-of-national-small-business-week</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-labs-to-host-booth-meetups-during-black-hat-on-dissecting-the-hacking-teams-operation-methods-what-security-teams-need-to-know</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/pr-newswire.jpg</image:loc><image:caption>prnewswire</image:caption><image:title>prnewswire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/enterprise-organizations-are-taking-steps-to-improve-cybersecurity-analytics-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/esg.jpg</image:loc><image:caption>esg</image:caption><image:title>esg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alert-kimsuky</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-thursday-september-8th-2022-ransomware-impact-on-incident-response-strategies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113218.959.png</image:loc><image:caption>blogposttext20220920T113218959</image:caption><image:title>blogposttext20220920T113218959</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/headshot_Greg%20Day.png</image:loc><image:caption>headshotGregDay</image:caption><image:title>headshotGregDay</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(122).png</image:loc><image:caption>blogposttext122</image:caption><image:title>blogposttext122</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(126).png</image:loc><image:caption>blogposttext126</image:caption><image:title>blogposttext126</image:title></image:image><lastmod>2022-08-30</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-sandworm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-11.png</image:loc><image:caption>image211</image:caption><image:title>image211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(27).png</image:loc><image:caption>BLOGImagesTemplatev227</image:caption><image:title>BLOGImagesTemplatev227</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(24).png</image:loc><image:caption>BLOGImagesTemplatev224</image:caption><image:title>BLOGImagesTemplatev224</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-05-16</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-racks-up-multiple-industry-honors-in-2016</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_344273369-1024x391.jpg</image:loc><image:caption>shutterstock3442733691024x391</image:caption><image:title>shutterstock3442733691024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/capability-vs-usability-blog-featured.png</image:loc><image:caption>capabilityvsusabilityblogfeatured</image:caption><image:title>capabilityvsusabilityblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hbos-hacked-emails-pose-unique-problem</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Hollywood-Reporter.png</image:loc><image:caption>HollywoodReporter</image:caption><image:title>HollywoodReporter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/things-that-keep-cisos-up-at-night</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/9916-padlock-_article-1.jpg</image:loc><image:caption>9916padlockarticle1</image:caption><image:title>9916padlockarticle1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(32)-1.png</image:loc><image:caption>CybereasonBlogTemplate321</image:caption><image:title>CybereasonBlogTemplate321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(38)-1.png</image:loc><image:caption>CybereasonBlogTemplate381</image:caption><image:title>CybereasonBlogTemplate381</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs.-netwalker-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T093119.758.png</image:loc><image:caption>blogposttext20220830T093119758</image:caption><image:title>blogposttext20220830T093119758</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/netwalker-blog-10.png</image:loc><image:caption>netwalkerblog10</image:caption><image:title>netwalkerblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RYUK1%20(1).png</image:loc><image:caption>RYUK11</image:caption><image:title>RYUK11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/netwalker-blog-5.png</image:loc><image:caption>netwalkerblog5</image:caption><image:title>netwalkerblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/netwalker-blog-4.png</image:loc><image:caption>netwalkerblog4</image:caption><image:title>netwalkerblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/netwalker-blog-11.png</image:loc><image:caption>netwalkerblog11</image:caption><image:title>netwalkerblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/tom-fakterman.jpg</image:loc><image:caption>tomfakterman</image:caption><image:title>tomfakterman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/netwalker-blog-1.png</image:loc><image:caption>netwalkerblog1</image:caption><image:title>netwalkerblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/netwalker-blog-9.png</image:loc><image:caption>netwalkerblog9</image:caption><image:title>netwalkerblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/netwalker-blog-7.png</image:loc><image:caption>netwalkerblog7</image:caption><image:title>netwalkerblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/netwalker-blog-2.png</image:loc><image:caption>netwalkerblog2</image:caption><image:title>netwalkerblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/netwalker-blog-3.png</image:loc><image:caption>netwalkerblog3</image:caption><image:title>netwalkerblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/netwalker-blog-8.png</image:loc><image:caption>netwalkerblog8</image:caption><image:title>netwalkerblog8</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-driving-the-surge-of-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(27).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews27</image:caption><image:title>CopyofBLOGSOCIALSETNews27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware.png</image:loc><image:caption>ransomware</image:caption><image:title>ransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/securing-critical-infrastructure-with-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(9).png</image:loc><image:caption>blogposttext9</image:caption><image:title>blogposttext9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(16).png</image:loc><image:caption>blogposttext16</image:caption><image:title>blogposttext16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(52).png</image:loc><image:caption>blogposttext52</image:caption><image:title>blogposttext52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><lastmod>2022-03-25</lastmod></url><url><loc>https://www.cybereason.com/blog/a-cyber-security-company-with-blue-owl-the-story-behind-cybereasons-logo</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-12.jpg</image:loc><image:caption>Untitleddesign12</image:caption><image:title>Untitleddesign12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews11</image:caption><image:title>CopyofBLOGSOCIALSETNews11</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-malicious-life-episode-4-the-year-of-the-ddos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-246-Card.png</image:loc><image:caption>MLEp246Card</image:caption><image:title>MLEp246Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Eliad%20Kimhy.jpg</image:loc><image:caption>EliadKimhy</image:caption><image:title>EliadKimhy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Twitter-post-image-Malicious-Life-1024x5121.png</image:loc><image:caption>TwitterpostimageMaliciousLife1024x5121</image:caption><image:title>TwitterpostimageMaliciousLife1024x5121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-248-Card.png</image:loc><image:caption>MLEp248Card</image:caption><image:title>MLEp248Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/operation-snowglobe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-5.png</image:loc><image:caption>image145</image:caption><image:title>image145</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-01-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/snake-malware-biting-hard-on-50-apps-for-only-25</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bleeping%20Computer%20logo-4.png</image:loc><image:caption>BleepingComputerlogo4</image:caption><image:title>BleepingComputerlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-11-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/italian-watchdog-reportedly-launches-probe-into-linkedin-data-leak</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20National%20(Middle%20East)%20logo-2.png</image:loc><image:caption>TheNationalMiddleEastlogo2</image:caption><image:title>TheNationalMiddleEastlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/three-pillars-of-infosec-confidentiality-integrity-and-availability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-cranford-author.png</image:loc><image:caption>jjcranfordauthor</image:caption><image:title>jjcranfordauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(29).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews29</image:caption><image:title>CopyofBLOGSOCIALSETNews29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-05-16T094933.342.png</image:loc><image:caption>blogposttext20220516T094933342</image:caption><image:title>blogposttext20220516T094933342</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Renaissance.png</image:loc><image:caption>Renaissance</image:caption><image:title>Renaissance</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-06-03</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-revealing-the-adversary-in-real-time</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2022%20Holiday%20Ransomware%20Study.png</image:loc><image:caption>2022HolidayRansomwareStudy</image:caption><image:title>2022HolidayRansomwareStudy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-andrew-ginter-a-40-year-old-backdoor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(6).png</image:loc><image:caption>Maliciouslifepodcast6</image:caption><image:title>Maliciouslifepodcast6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Andrew%20Ginter.jpg</image:loc><image:caption>AndrewGinter</image:caption><image:title>AndrewGinter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-1.png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(20).png</image:loc><image:caption>MaliciousLifeepisode20</image:caption><image:title>MaliciousLifeepisode20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-08-01</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-inside-notpetya-ransomware-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/102%20-%20MALICIOUS%20LIFE%20(1).png</image:loc><image:caption>102MALICIOUSLIFE1</image:caption><image:title>102MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Would%20Happen%20if%20CBS%20Got%20Hacked.png</image:loc><image:caption>WhatWouldHappenifCBSGotHacked</image:caption><image:title>WhatWouldHappenifCBSGotHacked</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/resources/security-deep-dive-analyst-ciso-perspectives</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/CTA_BG-095696-edited.png</image:loc><image:caption>CTABG095696edited</image:caption><image:title>CTABG095696edited</image:title></image:image><lastmod>2019-01-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/https/www.securityweek.com/fauxpersky-credential-stealer-spreads-usb-drives</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/securityweek-1.png</image:loc><image:caption>securityweek1</image:caption><image:title>securityweek1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-03-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/threat-hunters-analyze-trends-in-destructive-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-cisos-no-insider-cybersecurity-risk-guess-again</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template%20(4).png</image:loc><image:caption>CISOStoriesTemplate4</image:caption><image:title>CISOStoriesTemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dawn%20capelli.png</image:loc><image:caption>dawncapelli</image:caption><image:title>dawncapelli</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/blog/financial-services-and-the-evolving-ransomware-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(75).png</image:loc><image:caption>blogposttext75</image:caption><image:title>blogposttext75</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(20).png</image:loc><image:caption>blogposttext20</image:caption><image:title>blogposttext20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-02-08</lastmod></url><url><loc>https://www.cybereason.com/blog/when-your-edr-vendor-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(17)-1.png</image:loc><image:caption>CybereasonBlogTemplate171</image:caption><image:title>CybereasonBlogTemplate171</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202021-11-08%20at%2013-58-00%20Florian%20Roth%20%E2%9A%A1%EF%B8%8F%20on%20Twitter.png</image:loc><image:caption>Screenshot20211108at135800FlorianRothonTwitter</image:caption><image:title>Screenshot20211108at135800FlorianRothonTwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202021-11-08%20at%2015-09-24%20picketfence%20on%20Twitter%20(1).png</image:loc><image:caption>Screenshot20211108at150924picketfenceonTwitter1</image:caption><image:title>Screenshot20211108at150924picketfenceonTwitter1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/PAYG.png</image:loc><image:caption>PAYG</image:caption><image:title>PAYG</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-11-08</lastmod></url><url><loc>https://www.cybereason.com/blog/four-reasons-to-implement-an-xdr-solution-today</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-03T064719.647.png</image:loc><image:caption>blogposttext20220803T064719647</image:caption><image:title>blogposttext20220803T064719647</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-02T094421.274.png</image:loc><image:caption>blogposttext20220602T094421274</image:caption><image:title>blogposttext20220602T094421274</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(63).png</image:loc><image:caption>blogposttext63</image:caption><image:title>blogposttext63</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-08-03</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-russia-nation-state-hacking-the-countrys-dedicated-policy-of-strategic-ambiguity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_536247943-1.jpg</image:loc><image:caption>shutterstock5362479431</image:caption><image:title>shutterstock5362479431</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/blog/how-to-learn-from-an-attack-and-use-it-to-improve-your-security-plan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(3).png</image:loc><image:caption>MaliciousLifeTemplate3</image:caption><image:title>MaliciousLifeTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_335959709-1000x391.jpg</image:loc><image:caption>shutterstock3359597091000x391</image:caption><image:title>shutterstock3359597091000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/blog/the-timeline-to-consolidation-of-endpoint-protection-platforms-epp-and-endpoint-detection-and-response-edr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-1017183520.jpg</image:loc><image:caption>GettyImages1017183520</image:caption><image:title>GettyImages1017183520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/kovter-malware-upgrade-takes-it-from-mild-to-mean</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-secures-275-million-in-crossover-financing-to-extend-global-leadership-in-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/mit-sloan-cio-symposium-selects-finalists-for-2014-innovation-showcase-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/business_wire.jpg</image:loc><image:caption>businesswire</image:caption><image:title>businesswire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/are-businesses-asking-the-right-questions-when-it-comes-to-cloud-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-13.png</image:loc><image:caption>SCMagazine13</image:caption><image:title>SCMagazine13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2019-11-05</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-crypto-ag-part-3-the-truth-is-revealed</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(7).png</image:loc><image:caption>Maliciouslifepodcast7</image:caption><image:title>Maliciouslifepodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><lastmod>2022-03-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/why-authentication-is-still-the-cisos-biggest-headache</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-Apr-03-2022-10-57-09-62-PM.png</image:loc><image:caption>CSOMagazinelogoApr03202210570962PM</image:caption><image:title>CSOMagazinelogoApr03202210570962PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-04-03</lastmod></url><url><loc>https://www.cybereason.com/blog/edr-mdr-and-xdr-what-are-the-differences</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(3).png</image:loc><image:caption>ImagefromiOS3</image:caption><image:title>ImagefromiOS3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR_XDR.png</image:loc><image:caption>EDRXDR</image:caption><image:title>EDRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-28T132844.159.png</image:loc><image:caption>blogposttext20220628T132844159</image:caption><image:title>blogposttext20220628T132844159</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-06-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/on-eve-of-rsa-cybereason-talks-encryption-cyberwar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/xconomy.png</image:loc><image:caption>xconomy</image:caption><image:title>xconomy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-04-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/breaking-the-mould-why-north-korea-is-unlikely-to-be-behind-the-wannacry-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/exciting-times-at-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/iStock_000020205592Small-852x391.jpg</image:loc><image:caption>iStock000020205592Small852x391</image:caption><image:title>iStock000020205592Small852x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/%D7%97%D7%93%D7%A9_photo-chen_galili_06511-1.jpg</image:loc><image:caption>חדשphotochengalili065111</image:caption><image:title>חדשphotochengalili065111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(35).png</image:loc><image:caption>blogposttext35</image:caption><image:title>blogposttext35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(12).png</image:loc><image:caption>blogposttext12</image:caption><image:title>blogposttext12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-march10th-2022-live-attack-simulation-xdr-vs.-no-macro-ransomops</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(95).png</image:loc><image:caption>blogposttext95</image:caption><image:title>blogposttext95</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eric.png</image:loc><image:caption>eric</image:caption><image:title>eric</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(30).png</image:loc><image:caption>blogposttext30</image:caption><image:title>blogposttext30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-03-11</lastmod></url><url><loc>https://www.cybereason.com/resources/why-we-should-no-longer-call-it-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/No-Longer-Call-It-Ransomware-On-Demand-2024.png</image:loc><image:caption>NoLongerCallItRansomwareOnDemand2024</image:caption><image:title>NoLongerCallItRansomwareOnDemand2024</image:title></image:image><lastmod>2024-07-08</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-model-driven-security-leveraging-data-science</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO_51.png</image:loc><image:caption>CISO51</image:caption><image:title>CISO51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jim%20Routh-1.png</image:loc><image:caption>JimRouth1</image:caption><image:title>JimRouth1</image:title></image:image><lastmod>2022-01-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/solarwinds-cyber-attack-how-worried-should-i-be-and-what-do-i-do-now</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-Dec-21-2020-01-50-25-92-AM.png</image:loc><image:caption>ComputerWeeklylogoDec21202001502592AM</image:caption><image:title>ComputerWeeklylogoDec21202001502592AM</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/press/new-cybereason-study-reveals-that-ransomware-attacks-and-workforce-shortages-are-keeping-a-stranglehold-on-security-operations-centers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-03-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/12-most-exciting-cybersecurity-technologies-to-watch-at-black-hat-2019</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN-Logo-4.png</image:loc><image:caption>CRNLogo4</image:caption><image:title>CRNLogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2019-08-27</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-vs.-revil-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template-1.png</image:loc><image:caption>CybereasonVsTemplate1</image:caption><image:title>CybereasonVsTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><lastmod>2021-07-06</lastmod></url><url><loc>https://www.cybereason.com/blog/protecting-your-org-from-collateral-damage-through-operational-resilience</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(37)-1.png</image:loc><image:caption>blogposttext371</image:caption><image:title>blogposttext371</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(53).png</image:loc><image:caption>blogposttext53</image:caption><image:title>blogposttext53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-05T144829.712.png</image:loc><image:caption>blogposttext20220705T144829712</image:caption><image:title>blogposttext20220705T144829712</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-07-14</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-ai-hunting-platform-earns-a-recommended-designation-from-sc-labs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-08-24</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-names-masayuki-moteki-president-of-cybereason-japan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-28</lastmod></url><url><loc>https://www.cybereason.com/resources/attack-sim/hunter/us/021623</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Attack-Simulation-Banner-NA-2.16.23.png</image:loc><image:caption>AttackSimulationBannerNA21623</image:caption><image:title>AttackSimulationBannerNA21623</image:title></image:image><lastmod>2023-02-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/valak-gives-crooks-flexibility-in-multi-stage-malware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cyberscoop-1.png</image:loc><image:caption>Cyberscoop1</image:caption><image:title>Cyberscoop1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-05-29</lastmod></url><url><loc>https://www.cybereason.com/blog/operation-cobalt-kitty-apt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/doit.png</image:loc><image:caption>doit</image:caption><image:title>doit</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/push-1.png</image:loc><image:caption>push1</image:caption><image:title>push1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/dnstunneling1-1.png</image:loc><image:caption>dnstunneling11</image:caption><image:title>dnstunneling11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/wscript.png</image:loc><image:caption>wscript</image:caption><image:title>wscript</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/cmdline.png</image:loc><image:caption>cmdline</image:caption><image:title>cmdline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/dnstunneling-3.png</image:loc><image:caption>dnstunneling3</image:caption><image:title>dnstunneling3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/phishingemail-1.png</image:loc><image:caption>phishingemail1</image:caption><image:title>phishingemail1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/fakegoogle-1.png</image:loc><image:caption>fakegoogle1</image:caption><image:title>fakegoogle1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/assaf-hs-hex.png</image:loc><image:caption>assafhshex</image:caption><image:title>assafhshex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/compromisedmachine.png</image:loc><image:caption>compromisedmachine</image:caption><image:title>compromisedmachine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/kapersky-1.png</image:loc><image:caption>kapersky1</image:caption><image:title>kapersky1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/mimikatz.png</image:loc><image:caption>mimikatz</image:caption><image:title>mimikatz</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Untitled-design-52.png</image:loc><image:caption>Untitleddesign52</image:caption><image:title>Untitleddesign52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/deatinationprot.png</image:loc><image:caption>deatinationprot</image:caption><image:title>deatinationprot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/schedukedtask2-1.png</image:loc><image:caption>schedukedtask21</image:caption><image:title>schedukedtask21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/dnstunneling2-1.png</image:loc><image:caption>dnstunneling21</image:caption><image:title>dnstunneling21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/ecpte.png</image:loc><image:caption>ecpte</image:caption><image:title>ecpte</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1).png</image:loc><image:caption>BLOGPOST1</image:caption><image:title>BLOGPOST1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/fakemicrosoft-1.png</image:loc><image:caption>fakemicrosoft1</image:caption><image:title>fakemicrosoft1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/passthehash.png</image:loc><image:caption>passthehash</image:caption><image:title>passthehash</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-part-1-analysis-blog-analysis-featured.png</image:loc><image:caption>cuckoospearpart1analysisbloganalysisfeatured</image:caption><image:title>cuckoospearpart1analysisbloganalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/fakegoogle2.png</image:loc><image:caption>fakegoogle2</image:caption><image:title>fakegoogle2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/hiddenwindow.png</image:loc><image:caption>hiddenwindow</image:caption><image:title>hiddenwindow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/newojectio-1.png</image:loc><image:caption>newojectio1</image:caption><image:title>newojectio1</image:title></image:image><lastmod>2021-12-22</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/cody-queen</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(60).png</image:loc><image:caption>blogposttext60</image:caption><image:title>blogposttext60</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(7).png</image:loc><image:caption>Vs7</image:caption><image:title>Vs7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(8).png</image:loc><image:caption>blogposttext8</image:caption><image:title>blogposttext8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-2.jpg</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T083517.794.png</image:loc><image:caption>blogposttext20220907T083517794</image:caption><image:title>blogposttext20220907T083517794</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-08-22</lastmod></url><url><loc>https://www.cybereason.com/de/</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-detectia--in-flight.webp</image:loc><image:caption>crowldetectiainflight</image:caption><image:title>crowldetectiainflight</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-square-multicolor.png</image:loc><image:caption>crshapestackthreesquaremulticolor</image:caption><image:title>crshapestackthreesquaremulticolor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/activecampaign-bw.svg</image:loc><image:caption>activecampaignbw</image:caption><image:title>activecampaignbw</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase__mobile-group-respondor.png</image:loc><image:caption>crowlshowcasemobilegrouprespondor</image:caption><image:title>crowlshowcasemobilegrouprespondor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-detectia-v2-1500px.png</image:loc><image:caption>crowlshowcasedetectiav21500px</image:caption><image:title>crowlshowcasedetectiav21500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__four-lines-185px.png</image:loc><image:caption>crshapestackfourlines185px</image:caption><image:title>crshapestackfourlines185px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-respondor-v2-850px.png</image:loc><image:caption>crowlshowcaserespondorv2850px</image:caption><image:title>crowlshowcaserespondorv2850px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zoom.jpg</image:loc><image:caption>zoom</image:caption><image:title>zoom</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-preventid-1500px.png</image:loc><image:caption>crowlshowcasepreventid1500px</image:caption><image:title>crowlshowcasepreventid1500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase__mobile-group-preventid.png</image:loc><image:caption>crowlshowcasemobilegrouppreventid</image:caption><image:title>crowlshowcasemobilegrouppreventid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Approved%20Customer%20Logos/Customer-Logo-Softbank-Black.png</image:loc><image:caption>CustomerLogoSoftbankBlack</image:caption><image:title>CustomerLogoSoftbankBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/Korean_Air_Logo-BW.png</image:loc><image:caption>KoreanAirLogoBW</image:caption><image:title>KoreanAirLogoBW</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/quote-photo@2x.png</image:loc><image:caption>quotephoto2x</image:caption><image:title>quotephoto2x</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Approved%20Customer%20Logos/Customer-Logo-Motorola-Black.png</image:loc><image:caption>CustomerLogoMotorolaBlack</image:caption><image:title>CustomerLogoMotorolaBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/cr-platform-graphic-2024.png</image:loc><image:caption>crplatformgraphic2024</image:caption><image:title>crplatformgraphic2024</image:title></image:image><lastmod>2024-04-02</lastmod></url><url><loc>https://www.cybereason.com/blog/why-cybereason-beats-network-packet-capture</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_265447892.jpg</image:loc><image:caption>shutterstock265447892</image:caption><image:title>shutterstock265447892</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blank-avatar.png</image:loc><image:caption>blankavatar</image:caption><image:title>blankavatar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-06T070615.090.png</image:loc><image:caption>blogposttext20220906T070615090</image:caption><image:title>blogposttext20220906T070615090</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-19T122257.609.png</image:loc><image:caption>blogposttext20220919T122257609</image:caption><image:title>blogposttext20220919T122257609</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/meet-the-league-of-defenders</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-preventid-1500px.png</image:loc><image:caption>crowlshowcasepreventid1500px</image:caption><image:title>crowlshowcasepreventid1500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-05T074007.547.png</image:loc><image:caption>blogposttext20220805T074007547</image:caption><image:title>blogposttext20220805T074007547</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-detectia-1500px.png</image:loc><image:caption>crowlshowcasedetectia1500px</image:caption><image:title>crowlshowcasedetectia1500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/making-of-the-defenders-blog.png</image:loc><image:caption>makingofthedefendersblog</image:caption><image:title>makingofthedefendersblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/meg-oleary-600px.jpg</image:loc><image:caption>megoleary600px</image:caption><image:title>megoleary600px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-logo-web-horizontal-black-500px.png</image:loc><image:caption>crlogowebhorizontalblack500px</image:caption><image:title>crlogowebhorizontalblack500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-respondor-v2-850px.png</image:loc><image:caption>crowlshowcaserespondorv2850px</image:caption><image:title>crowlshowcaserespondorv2850px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-investig8-1500px.png</image:loc><image:caption>crowlshowcaseinvestig81500px</image:caption><image:title>crowlshowcaseinvestig81500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-new-game-changers-partner-investments-are-the-most-lucrative-in-the-cybersecurity-industry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-09-09</lastmod></url><url><loc>https://www.cybereason.com/resources/ngav-redefined/webinar/us/111022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/NGAV-Webinar-11.10.22-Updated.png</image:loc><image:caption>NGAVWebinar111022Updated</image:caption><image:title>NGAVWebinar111022Updated</image:title></image:image><lastmod>2022-11-29</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-partners-with-eguardian-to-defend-organizations-against-complex-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(10).png</image:loc><image:caption>blogposttext10</image:caption><image:title>blogposttext10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hacking-back-bill-gains-sponsors-in-the-house</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/destructive-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/ITProPortal-Logo-for-FB-300x157.jpg</image:loc><image:caption>ITProPortalLogoforFB300x157</image:caption><image:title>ITProPortalLogoforFB300x157</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-year-on-from-wannacry-is-ransomware-still-a-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Teiss%20Logo.jpg</image:loc><image:caption>TeissLogo</image:caption><image:title>TeissLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2018-07-18</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-conficker</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(24).png</image:loc><image:caption>MaliciousLifeepisode24</image:caption><image:title>MaliciousLifeepisode24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yonaton-Striem-Amit-HS-1.png</image:loc><image:caption>YonatonStriemAmitHS1</image:caption><image:title>YonatonStriemAmitHS1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/51%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>51MALICIOUSLIFE</image:caption><image:title>51MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-named-rookie-security-company-of-the-year-by-sc-magazine</loc><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2022%20Holiday%20Ransomware%20Study.png</image:loc><image:caption>2022HolidayRansomwareStudy</image:caption><image:title>2022HolidayRansomwareStudy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Blog-Banner-full_SC-Mag-Winner-1024x300.jpg</image:loc><image:caption>BlogBannerfullSCMagWinner1024x300</image:caption><image:title>BlogBannerfullSCMagWinner1024x300</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/resources/ransomware-decoded-webinar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/Ransomware-Decoded-On-Demand-Lodrina.png</image:loc><image:caption>RansomwareDecodedOnDemandLodrina</image:caption><image:title>RansomwareDecodedOnDemandLodrina</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-06-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/why-hacking-back-rarely-works</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/company/cybereason-business-value-calculator</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-case-study-22-Seton-Hall--thumb-full.jpg</image:loc><image:caption>crcasestudy22SetonHallthumbfull</image:caption><image:title>crcasestudy22SetonHallthumbfull</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-sand-owl--transparent.png</image:loc><image:caption>crsandowltransparent</image:caption><image:title>crsandowltransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--owl-swoop-dark-02.jpg</image:loc><image:caption>crbgheroowlswoopdark02</image:caption><image:title>crbgheroowlswoopdark02</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-to-earn-the-trust-of-other-executives-cisos-should-follow-the-cios-evolution</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories%20(1).png</image:loc><image:caption>CISOStories1</image:caption><image:title>CISOStories1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_685720867.jpg</image:loc><image:caption>shutterstock685720867</image:caption><image:title>shutterstock685720867</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(8).png</image:loc><image:caption>CISOStoriespodcast8</image:caption><image:title>CISOStoriespodcast8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2023-02-10</lastmod></url><url><loc>https://www.cybereason.com/services/professional-services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-icon--black.svg</image:loc><image:caption>crlogoiconblack</image:caption><image:title>crlogoiconblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-100px.png</image:loc><image:caption>crchartcheckmark100px</image:caption><image:title>crchartcheckmark100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-modal--bg-placeholder-03.jpg</image:loc><image:caption>crplatformmodalbgplaceholder03</image:caption><image:title>crplatformmodalbgplaceholder03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/iconsand.png</image:loc><image:caption>iconsand</image:caption><image:title>iconsand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__optional-100px.png</image:loc><image:caption>crchartoptional100px</image:caption><image:title>crchartoptional100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/IR_Service_v1_thumbnail-min.png</image:loc><image:caption>IRServicev1thumbnailmin</image:caption><image:title>IRServicev1thumbnailmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/IR_ProfService_Brief_v1_Thumbnail.png</image:loc><image:caption>IRProfServiceBriefv1Thumbnail</image:caption><image:title>IRProfServiceBriefv1Thumbnail</image:title></image:image><lastmod>2023-02-13</lastmod></url><url><loc>https://www.cybereason.com/blog/how-to-use-security-incidents-to-gain-an-advantage-over-attackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/keyhole-1000x391.jpg</image:loc><image:caption>keyhole1000x391</image:caption><image:title>keyhole1000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/north-korea-south-korea-us-troops-talks-friday-nuclear</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_395414536.jpg</image:loc><image:caption>shutterstock395414536</image:caption><image:title>shutterstock395414536</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/136%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>136MALICIOUSLIFE</image:caption><image:title>136MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4)-1.png</image:loc><image:caption>MaliciousLifeepisode41</image:caption><image:title>MaliciousLifeepisode41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-ciso-interview-series-the-case-for-hiring-your-ciso-from-within-and-advice-on-how-to-do-it</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(9).png</image:loc><image:caption>CISOStoriestemplate9</image:caption><image:title>CISOStoriestemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Untitled-design-39-1.png</image:loc><image:caption>Untitleddesign391</image:caption><image:title>Untitleddesign391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_637229056.jpg</image:loc><image:caption>shutterstock637229056</image:caption><image:title>shutterstock637229056</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><lastmod>2023-02-10</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-government-inc.-warns-of-log4shell-exploits-over-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-12-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-cybersecurity-researchers-learned-when-they-left-a-tempting-trap-for-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet-3.jpg</image:loc><image:caption>ZDNet3</image:caption><image:title>ZDNet3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-06-24</lastmod></url><url><loc>https://www.cybereason.com/blog/meltdown-spectre-questions-answered</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(3).png</image:loc><image:caption>MaliciousLifeTemplate3</image:caption><image:title>MaliciousLifeTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Wall-LARGEV2.png</image:loc><image:caption>WallLARGEV2</image:caption><image:title>WallLARGEV2</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-so-you-want-to-be-a-cyber-spy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template-3.png</image:loc><image:caption>CISOStoriesTemplate3</image:caption><image:title>CISOStoriesTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200-Jun-10-2021-01-52-53-70-PM.png</image:loc><image:caption>pastedimage0Jun10202101525370PM</image:caption><image:title>pastedimage0Jun10202101525370PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories%20(1).png</image:loc><image:caption>CISOStories1</image:caption><image:title>CISOStories1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-its-newest-customer-g-star-raw</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-08-27</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-cyderes-partner-to-deliver-managed-detection-and-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(33).png</image:loc><image:caption>CybereasonBlogTemplate33</image:caption><image:title>CybereasonBlogTemplate33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/PAYG.png</image:loc><image:caption>PAYG</image:caption><image:title>PAYG</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(92).png</image:loc><image:caption>blogposttext92</image:caption><image:title>blogposttext92</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/employee-spotlight-black-history-icon-bessie-coleman-exemplifies-our-core-values</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Feb-18-2022-04-29-56-04-PM.png</image:loc><image:caption>image1Feb18202204295604PM</image:caption><image:title>image1Feb18202204295604PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(25).png</image:loc><image:caption>blogposttext25</image:caption><image:title>blogposttext25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20Sibel%20Narin-Farooq.png</image:loc><image:caption>EmployeeSpotlightSibelNarinFarooq</image:caption><image:title>EmployeeSpotlightSibelNarinFarooq</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-1.jpg</image:loc><image:caption>image21</image:caption><image:title>image21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(38).png</image:loc><image:caption>blogposttext38</image:caption><image:title>blogposttext38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-05-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-launches-new-solution-to-protect-enterprise-networks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Beta%20News%20logo.png</image:loc><image:caption>BetaNewslogo</image:caption><image:title>BetaNewslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-11-11</lastmod></url><url><loc>https://www.cybereason.com/blog/microsoft-owa-backdoor-questions-answered</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(8).png</image:loc><image:caption>BLOGImagesTemplatev28</image:caption><image:title>BLOGImagesTemplatev28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/microsoft_owa.jpg</image:loc><image:caption>microsoftowa</image:caption><image:title>microsoftowa</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(17).png</image:loc><image:caption>BLOGImagesTemplatev217</image:caption><image:title>BLOGImagesTemplatev217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-02-18</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-exposes-chinese-threat-actors-compromising-telecommunications-providers-for-cyber-espionage</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-08-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/lives-are-at-stake-hacking-of-us-hospitals-highlights-deadly-risk-of-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Guardian%20logo.png</image:loc><image:caption>TheGuardianlogo</image:caption><image:title>TheGuardianlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs.-avaddon-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%20image%208.png</image:loc><image:caption>avaddonimage8</image:caption><image:title>avaddonimage8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vs-ransomware.png</image:loc><image:caption>vsransomware</image:caption><image:title>vsransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%2013.png</image:loc><image:caption>avaddon13</image:caption><image:title>avaddon13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%2010.png</image:loc><image:caption>avaddon10</image:caption><image:title>avaddon10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Daniel-F-HS-1-1.png</image:loc><image:caption>DanielFHS11</image:caption><image:title>DanielFHS11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%2012.png</image:loc><image:caption>avaddon12</image:caption><image:title>avaddon12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%20image%203.png</image:loc><image:caption>avaddonimage3</image:caption><image:title>avaddonimage3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%20omage%201.png</image:loc><image:caption>avaddonomage1</image:caption><image:title>avaddonomage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%20image%204.png</image:loc><image:caption>avaddonimage4</image:caption><image:title>avaddonimage4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%20image%207.png</image:loc><image:caption>avaddonimage7</image:caption><image:title>avaddonimage7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%2014%20left.png</image:loc><image:caption>avaddon14left</image:caption><image:title>avaddon14left</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%2014%20right.png</image:loc><image:caption>avaddon14right</image:caption><image:title>avaddon14right</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%20image%205.png</image:loc><image:caption>avaddonimage5</image:caption><image:title>avaddonimage5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%209.png</image:loc><image:caption>avaddon9</image:caption><image:title>avaddon9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%2011.png</image:loc><image:caption>avaddon11</image:caption><image:title>avaddon11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Copy%20of%20RYUK1.png</image:loc><image:caption>CopyofCopyofRYUK1</image:caption><image:title>CopyofCopyofRYUK1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%20image%202.png</image:loc><image:caption>avaddonimage2</image:caption><image:title>avaddonimage2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/avaddon%20image%206.png</image:loc><image:caption>avaddonimage6</image:caption><image:title>avaddonimage6</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/resources/case-studies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/retail-case-study-card.png</image:loc><image:caption>retailcasestudycard</image:caption><image:title>retailcasestudycard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/seton-hall-cs-cover.png</image:loc><image:caption>setonhallcscover</image:caption><image:title>setonhallcscover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cs-higher-ed-cover.png</image:loc><image:caption>cshigheredcover</image:caption><image:title>cshigheredcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/bs-case-study-card-2.png</image:loc><image:caption>bscasestudycard2</image:caption><image:title>bscasestudycard2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/hospitality-case-study-featured.png</image:loc><image:caption>hospitalitycasestudyfeatured</image:caption><image:title>hospitalitycasestudyfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cpsb-case-study-cover.png</image:loc><image:caption>cpsbcasestudycover</image:caption><image:title>cpsbcasestudycover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/follet-case-study-thumbnail.png</image:loc><image:caption>folletcasestudythumbnail</image:caption><image:title>folletcasestudythumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pensiondanmark-card.png</image:loc><image:caption>pensiondanmarkcard</image:caption><image:title>pensiondanmarkcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/pioneer-case-study-card.png</image:loc><image:caption>pioneercasestudycard</image:caption><image:title>pioneercasestudycard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/global-real-estate-company-card.png</image:loc><image:caption>globalrealestatecompanycard</image:caption><image:title>globalrealestatecompanycard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/olist-cover-thumb-small.png</image:loc><image:caption>olistcoverthumbsmall</image:caption><image:title>olistcoverthumbsmall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE%202024%20CYBEREASON.png</image:loc><image:caption>MITRE2024CYBEREASON</image:caption><image:title>MITRE2024CYBEREASON</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/scm-case-study-card2.png</image:loc><image:caption>scmcasestudycard2</image:caption><image:title>scmcasestudycard2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/hospitality-case-study-cover.png</image:loc><image:caption>hospitalitycasestudycover</image:caption><image:title>hospitalitycasestudycover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/motorola-mobility-cs-featured.png</image:loc><image:caption>motorolamobilitycsfeatured</image:caption><image:title>motorolamobilitycsfeatured</image:title></image:image><lastmod>2022-03-29</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-understanding-chinas-cyber-culture</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-242-Card.png</image:loc><image:caption>MLEp242Card</image:caption><image:title>MLEp242Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/126%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>126MALICIOUSLIFE</image:caption><image:title>126MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bill%20Hagestad%20.png</image:loc><image:caption>BillHagestad</image:caption><image:title>BillHagestad</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/automated-cyber-hunting</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(8).png</image:loc><image:caption>blogposttext8</image:caption><image:title>blogposttext8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-11.png</image:loc><image:caption>Untitleddesign11</image:caption><image:title>Untitleddesign11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T072637.791.png</image:loc><image:caption>blogposttext20221005T072637791</image:caption><image:title>blogposttext20221005T072637791</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-12-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-takes-its-malicious-ops-detection-platform-out-of-stealth-backed-by-4.6m-from-crv</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/tech_crunch.jpg</image:loc><image:caption>techcrunch</image:caption><image:title>techcrunch</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/heres-why-lockheed-invested-in-a-commercial-cyber-company</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/washington_business.jpg</image:loc><image:caption>washingtonbusiness</image:caption><image:title>washingtonbusiness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/resources/eliminate-alert-fatigue</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WP_Overcoming_Alert_Fatigue_with_Cybereason_final_Page_01.png</image:loc><image:caption>WPOvercomingAlertFatiguewithCybereasonfinalPage01</image:caption><image:title>WPOvercomingAlertFatiguewithCybereasonfinalPage01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2023-01-31</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-ashley-madison-hack-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/steve%20ragan.jpg</image:loc><image:caption>steveragan</image:caption><image:title>steveragan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/33%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>33MALICIOUSLIFE</image:caption><image:title>33MALICIOUSLIFE</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/consulting/experts/dave-sigmundson</loc><lastmod>2025-08-19</lastmod></url><url><loc>https://www.cybereason.com/blog/north-koreas-new-found-position-of-power-after-missile-launch</loc><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(89).png</image:loc><image:caption>blogposttext89</image:caption><image:title>blogposttext89</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nk%20blog.jpg</image:loc><image:caption>nkblog</image:caption><image:title>nkblog</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-and-google-cloud-launch-ai-powered-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Beta%20News%20logo-Dec-15-2021-03-26-06-67-PM.png</image:loc><image:caption>BetaNewslogoDec15202103260667PM</image:caption><image:title>BetaNewslogoDec15202103260667PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-12-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/mass.-cyber-clusters-strength-will-be-underscored-at-calif.-trade-show</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/boston-globe-logo-2.jpg</image:loc><image:caption>bostonglobelogo2</image:caption><image:title>bostonglobelogo2</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-extended-detection-and-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/xdr-datasheet-cover-2022.png</image:loc><image:caption>xdrdatasheetcover2022</image:caption><image:title>xdrdatasheetcover2022</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-02-09</lastmod></url><url><loc>https://www.cybereason.com/careers/technical-operation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/play-btn.png</image:loc><image:caption>playbtn</image:caption><image:title>playbtn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Danielle%20Wood.png</image:loc><image:caption>UbUSpotlightDanielleWood</image:caption><image:title>UbUSpotlightDanielleWood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Josh%20Moody-1.png</image:loc><image:caption>UbUSpotlightJoshMoody1</image:caption><image:title>UbUSpotlightJoshMoody1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blue_concrete.jpg</image:loc><image:caption>blueconcrete</image:caption><image:title>blueconcrete</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Volpe_50%20on%20Fire.jpg</image:loc><image:caption>Volpe50onFire</image:caption><image:title>Volpe50onFire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A1484-2.jpg</image:loc><image:caption>D0A14842</image:caption><image:title>D0A14842</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/Marketing-01.jpg</image:loc><image:caption>Marketing01</image:caption><image:title>Marketing01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-09-11</lastmod></url><url><loc>https://www.cybereason.com/blog/harnessing-the-power-of-ai-driven-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(2)-1.png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T112612.527.png</image:loc><image:caption>blogposttext20220913T112612527</image:caption><image:title>blogposttext20220913T112612527</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(93).png</image:loc><image:caption>blogposttext93</image:caption><image:title>blogposttext93</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-05-11</lastmod></url><url><loc>https://www.cybereason.com/company/nocturnus</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-badge-yellow.png</image:loc><image:caption>threatalertbadgeyellow</image:caption><image:title>threatalertbadgeyellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-talons.png</image:loc><image:caption>crbgwhyinspektuswireframetalons</image:caption><image:title>crbgwhyinspektuswireframetalons</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILITY_HUNTING_CR_ICONS-13.svg</image:loc><image:caption>VISIBILITYHUNTINGCRICONS13</image:caption><image:title>VISIBILITYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/deadringer-blog-card-tall.png</image:loc><image:caption>deadringerblogcardtall</image:caption><image:title>deadringerblogcardtall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-badge-orange.png</image:loc><image:caption>threatalertbadgeorange</image:caption><image:title>threatalertbadgeorange</image:title></image:image><lastmod>2022-10-28</lastmod></url><url><loc>https://www.cybereason.com/blog/cyber-security-tips-for-allowing-employees-to-work-from-home</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-1.png</image:loc><image:caption>CybereasonBlogTemplate41</image:caption><image:title>CybereasonBlogTemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(2)-3.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews23</image:caption><image:title>CopyofBLOGSOCIALSETNews23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Remote-Work-Illus-Blog-A.jpg</image:loc><image:caption>RemoteWorkIllusBlogA</image:caption><image:title>RemoteWorkIllusBlogA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sean-mooney-hs.jpg</image:loc><image:caption>seanmooneyhs</image:caption><image:title>seanmooneyhs</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-announces-its-newest-customer-flybe-europes-largest-regional-airline</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-03-29</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-what-healthcare-cisos-can-do-differently</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(15)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews151</image:caption><image:title>CopyofBLOGSOCIALSETNews151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Healthcare%20CISOs%20Can%20Do%20Differently%20Ransomware-1.png</image:loc><image:caption>WhatHealthcareCISOsCanDoDifferentlyRansomware1</image:caption><image:title>WhatHealthcareCISOsCanDoDifferentlyRansomware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ai-potential-cybersecurity-featured.png</image:loc><image:caption>aipotentialcybersecurityfeatured</image:caption><image:title>aipotentialcybersecurityfeatured</image:title></image:image><lastmod>2022-12-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/heartbleed-blamed-in-attack-on-canada-tax-agency-more-expected</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/chicago_tribune.jpg</image:loc><image:caption>chicagotribune</image:caption><image:title>chicagotribune</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/revamped-valak-malware-targets-exchange-servers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GovInfoSecurity%20Logo.jpg</image:loc><image:caption>GovInfoSecurityLogo</image:caption><image:title>GovInfoSecurityLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-06-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/airport-services-firm-thwarts-attempted-ransomware-heist</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-Feb-10-2022-03-41-26-10-PM.png</image:loc><image:caption>ComputerWeeklylogoFeb10202203412610PM</image:caption><image:title>ComputerWeeklylogoFeb10202203412610PM</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/blog/product/cybereason-xdr-10x-faster-threat-hunting</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10XThreat.png</image:loc><image:caption>10XThreat</image:caption><image:title>10XThreat</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zerotrust.png</image:loc><image:caption>zerotrust</image:caption><image:title>zerotrust</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/attack%20tree%20overview.gif</image:loc><image:caption>attacktreeoverview</image:caption><image:title>attacktreeoverview</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Query%20example-1.gif</image:loc><image:caption>Queryexample1</image:caption><image:title>Queryexample1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/process%20bubble.jpg</image:loc><image:caption>processbubble</image:caption><image:title>processbubble</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/ai-hunting-threat-hunting-questions-webinar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Fast_Movement_1920x1080.jpg</image:loc><image:caption>FastMovement1920x1080</image:caption><image:title>FastMovement1920x1080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-tech-data-partner-to-end-cyberattacks-in-asia-pacific-region</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2021-11-12</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-endpoint-protection-platform-delivers-308-percent-roi-according-to-study-by-leading-independent-analyst-firm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-06-24</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-achieved-1200-revenue-growth-and-quadrupled-its-headcount-in-2015-prepares-for-continued-disruption-in-2016</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(26)-2.png</image:loc><image:caption>CybereasonBlogTemplate262</image:caption><image:title>CybereasonBlogTemplate262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/eu-network-information-security-blog-featured.png</image:loc><image:caption>eunetworkinformationsecurityblogfeatured</image:caption><image:title>eunetworkinformationsecurityblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/labs-using-behavioral-analysis-to-detect-the-ursnif-banking-trojan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%2014.png</image:loc><image:caption>asset14</image:caption><image:title>asset14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%207.png</image:loc><image:caption>asset7</image:caption><image:title>asset7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%206.png</image:loc><image:caption>asset6</image:caption><image:title>asset6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%2010.png</image:loc><image:caption>asset10</image:caption><image:title>asset10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image17-3.png</image:loc><image:caption>image173</image:caption><image:title>image173</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%2012.png</image:loc><image:caption>asset12</image:caption><image:title>asset12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%2018.png</image:loc><image:caption>asset18</image:caption><image:title>asset18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%2013.png</image:loc><image:caption>asset13</image:caption><image:title>asset13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%209.png</image:loc><image:caption>asset9</image:caption><image:title>asset9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20img%20lummastealer-1.png</image:loc><image:caption>blogimglummastealer1</image:caption><image:title>blogimglummastealer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image14-2.png</image:loc><image:caption>image142</image:caption><image:title>image142</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%2016.png</image:loc><image:caption>asset16</image:caption><image:title>asset16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%203.png</image:loc><image:caption>asset3</image:caption><image:title>asset3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image9-1.png</image:loc><image:caption>image91</image:caption><image:title>image91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(11).png</image:loc><image:caption>BLOGImagesTemplatev211</image:caption><image:title>BLOGImagesTemplatev211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%204.png</image:loc><image:caption>asset4</image:caption><image:title>asset4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%2015.png</image:loc><image:caption>asset15</image:caption><image:title>asset15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Ursnif/asset%208.png</image:loc><image:caption>asset8</image:caption><image:title>asset8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Untitled-design-30.jpg</image:loc><image:caption>Untitleddesign30</image:caption><image:title>Untitleddesign30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-07-05</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-kurtis-minder-ransomware-negotiations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kurtis_minder.jpeg</image:loc><image:caption>kurtisminder</image:caption><image:title>kurtisminder</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(18).png</image:loc><image:caption>MaliciousLifeepisode18</image:caption><image:title>MaliciousLifeepisode18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-07-18</lastmod></url><url><loc>https://www.cybereason.com/blog/fbi-cisa-warning-on-cuba-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FBI-CISA-Cuba-Ransomware.png</image:loc><image:caption>FBICISACubaRansomware</image:caption><image:title>FBICISACubaRansomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(21).png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(11)-1.png</image:loc><image:caption>CybereasonBlogTemplate111</image:caption><image:title>CybereasonBlogTemplate111</image:title></image:image><lastmod>2022-12-02</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-june-30th-2022-live-attack-simulation-ransomware-threat-hunter-series</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jj-hex-hs2.png</image:loc><image:caption>jjhexhs2</image:caption><image:title>jjhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(67).png</image:loc><image:caption>blogposttext67</image:caption><image:title>blogposttext67</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94).png</image:loc><image:caption>blogposttext94</image:caption><image:title>blogposttext94</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-02T094314.734.png</image:loc><image:caption>blogposttext20220602T094314734</image:caption><image:title>blogposttext20220602T094314734</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Headshot%20image%20template%20(6).png</image:loc><image:caption>CopyofHeadshotimagetemplate6</image:caption><image:title>CopyofHeadshotimagetemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-06-03</lastmod></url><url><loc>https://www.cybereason.com/resources/using-mitre-attck-to-identify-advanced-threats-operation-soft-cell</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Aerial_Road_banner.jpg</image:loc><image:caption>AerialRoadbanner</image:caption><image:title>AerialRoadbanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2019-09-10</lastmod></url><url><loc>https://www.cybereason.com/protecting-finance-industry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/play%20button.png</image:loc><image:caption>playbutton</image:caption><image:title>playbutton</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/platform-bg-shape-sm.png</image:loc><image:caption>platformbgshapesm</image:caption><image:title>platformbgshapesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gray-bg.jpg</image:loc><image:caption>graybg</image:caption><image:title>graybg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/benjamin-dos-santos-314607.jpg</image:loc><image:caption>benjamindossantos314607</image:caption><image:title>benjamindossantos314607</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/full-background.png</image:loc><image:caption>fullbackground</image:caption><image:title>fullbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/video-background.jpg</image:loc><image:caption>videobackground</image:caption><image:title>videobackground</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-to-crns-security-100-for-endpoint-security-and-receives-a-cybersecurity-excellence-award</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-google-cloud-this-is-xdr-tour</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(92).png</image:loc><image:caption>blogposttext92</image:caption><image:title>blogposttext92</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(38)-1.png</image:loc><image:caption>CybereasonBlogTemplate381</image:caption><image:title>CybereasonBlogTemplate381</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(32)-1.png</image:loc><image:caption>CybereasonBlogTemplate321</image:caption><image:title>CybereasonBlogTemplate321</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/bad-actors-look-to-spread-bad-rabbit-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/StateHouseNews.png</image:loc><image:caption>StateHouseNews</image:caption><image:title>StateHouseNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/cyber-securitys-identical-lock-problem</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-81-1024x391.jpg</image:loc><image:caption>Untitleddesign811024x391</image:caption><image:title>Untitleddesign811024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/blogcommodity-adware-puts-smaller-medium-sized-businesses-on-an-attackers-hit-list</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-02T070344.027.png</image:loc><image:caption>blogposttext20220802T070344027</image:caption><image:title>blogposttext20220802T070344027</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-20T064817.923.png</image:loc><image:caption>blogposttext20220720T064817923</image:caption><image:title>blogposttext20220720T064817923</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_530044462.jpg</image:loc><image:caption>shutterstock530044462</image:caption><image:title>shutterstock530044462</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-07-10</lastmod></url><url><loc>https://www.cybereason.com/blog/the-idc-ai-innovators-report-what-is-ai-where-is-it-going</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(26)-2.png</image:loc><image:caption>CybereasonBlogTemplate262</image:caption><image:title>CybereasonBlogTemplate262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(3).png</image:loc><image:caption>MaliciousLifeTemplate3</image:caption><image:title>MaliciousLifeTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-1090973498.png</image:loc><image:caption>GettyImages1090973498</image:caption><image:title>GettyImages1090973498</image:title></image:image><lastmod>2023-01-11</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-which-industries-are-most-likely-to-pay</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(114).png</image:loc><image:caption>blogposttext114</image:caption><image:title>blogposttext114</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(10)-1.png</image:loc><image:caption>CybereasonBlogTemplate101</image:caption><image:title>CybereasonBlogTemplate101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware%20Which%20Industries%20Are%20Most%20Likely%20to%20Pay-1.png</image:loc><image:caption>RansomwareWhichIndustriesAreMostLikelytoPay1</image:caption><image:title>RansomwareWhichIndustriesAreMostLikelytoPay1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-12-12</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-skills-i-needed-to-be-a-first-time-ciso</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(9).png</image:loc><image:caption>CISOStoriestemplate9</image:caption><image:title>CISOStoriestemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Richard%20Kaufmann-1.png</image:loc><image:caption>RichardKaufmann1</image:caption><image:title>RichardKaufmann1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><lastmod>2022-01-25</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-named-a-strong-performer-in-forrester-wave-for-mdr-2021</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mdr_wave_concept_1_1200x627.jpg</image:loc><image:caption>mdrwaveconcept11200x627</image:caption><image:title>mdrwaveconcept11200x627</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/critical-cisco-exploit-hands-attackers-keys-to-your-business-network</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITPro%20logo.jpg</image:loc><image:caption>ITPrologo</image:caption><image:title>ITPrologo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-discovers-a-global-outbreak-of-malware-attacks-using-bitbucket</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-02-18</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-launches-secureboston-</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-14</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-warns-global-organizations-against-destructive-ransomware-attacks-from-black-basta-gang</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/researchers-spoofed-a-power-grid-to-spot-dangerous-hacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/E&amp;E%20New%20logo.png</image:loc><image:caption>EENewlogo</image:caption><image:title>EENewlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-06-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/black-basta-ransomware-becomes-major-threat-in-two-months</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-Jun-24-2022-01-41-59-50-PM.jpg</image:loc><image:caption>SecurityWeeklogoJun24202201415950PM</image:caption><image:title>SecurityWeeklogoJun24202201415950PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-06-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/top-5-anti-phishing-training-programs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-14</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-international-expansion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/garmin-is-slowly-coming-back-online-after-a-massive-ransomware-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNN%20logo.png</image:loc><image:caption>CNNlogo</image:caption><image:title>CNNlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-08-06</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs.-lorenz-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Feb-01-2022-08-30-18-70-PM.png</image:loc><image:caption>image3Feb01202208301870PM</image:caption><image:title>image3Feb01202208301870PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Feb-01-2022-08-24-29-16-PM.png</image:loc><image:caption>image1Feb01202208242916PM</image:caption><image:title>image1Feb01202208242916PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Feb-01-2022-08-25-40-03-PM.png</image:loc><image:caption>image11Feb01202208254003PM</image:caption><image:title>image11Feb01202208254003PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Feb-01-2022-08-26-17-45-PM.png</image:loc><image:caption>image15Feb01202208261745PM</image:caption><image:title>image15Feb01202208261745PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Feb-01-2022-08-29-13-87-PM.png</image:loc><image:caption>image2Feb01202208291387PM</image:caption><image:title>image2Feb01202208291387PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Feb-01-2022-08-28-28-49-PM.png</image:loc><image:caption>image4Feb01202208282849PM</image:caption><image:title>image4Feb01202208282849PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Feb-01-2022-08-30-59-80-PM.png</image:loc><image:caption>image6Feb01202208305980PM</image:caption><image:title>image6Feb01202208305980PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vs-ransomware.png</image:loc><image:caption>vsransomware</image:caption><image:title>vsransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Feb-01-2022-08-32-00-75-PM.png</image:loc><image:caption>image14Feb01202208320075PM</image:caption><image:title>image14Feb01202208320075PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Lior%20R.png</image:loc><image:caption>LiorR</image:caption><image:title>LiorR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Feb-01-2022-08-26-58-40-PM.png</image:loc><image:caption>image9Feb01202208265840PM</image:caption><image:title>image9Feb01202208265840PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Feb-01-2022-08-31-31-54-PM.png</image:loc><image:caption>image10Feb01202208313154PM</image:caption><image:title>image10Feb01202208313154PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Feb-01-2022-08-28-00-84-PM.png</image:loc><image:caption>image8Feb01202208280084PM</image:caption><image:title>image8Feb01202208280084PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Feb-01-2022-08-27-25-31-PM.png</image:loc><image:caption>image5Feb01202208272531PM</image:caption><image:title>image5Feb01202208272531PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Feb-01-2022-08-29-40-79-PM.png</image:loc><image:caption>image7Feb01202208294079PM</image:caption><image:title>image7Feb01202208294079PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Feb-01-2022-08-30-39-74-PM.png</image:loc><image:caption>image12Feb01202208303974PM</image:caption><image:title>image12Feb01202208303974PM</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/press/ignition-technology-and-cybereason-announce-distribution-partnership-to-drive-european-channel-expansion-for-edr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-01-21</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-releases-vaccine-to-prevent-exploitation-of-apache-log4shell-vulnerability-cve-2021-44228</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(26)-2.png</image:loc><image:caption>CybereasonBlogTemplate262</image:caption><image:title>CybereasonBlogTemplate262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Headshot%20(1)-1.jpg</image:loc><image:caption>Headshot11</image:caption><image:title>Headshot11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Dec-15-2021-03-21-38-50-PM.png</image:loc><image:caption>CaptureDec15202103213850PM</image:caption><image:title>CaptureDec15202103213850PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(3).png</image:loc><image:caption>MaliciousLifeTemplate3</image:caption><image:title>MaliciousLifeTemplate3</image:title></image:image><lastmod>2021-12-17</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-launches-its-global-partner-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T131959.309.png</image:loc><image:caption>blogposttext20220926T131959309</image:caption><image:title>blogposttext20220926T131959309</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-1.png</image:loc><image:caption>CybereasonBlogTemplate31</image:caption><image:title>CybereasonBlogTemplate31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_543250270.jpg</image:loc><image:caption>shutterstock543250270</image:caption><image:title>shutterstock543250270</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-dominates-2023-mitre-attck-evaluations-enterprise-setting-the-new-standard-for-defense-against-adversary-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-09-21</lastmod></url><url><loc>https://www.cybereason.com/blog/steps-to-enhance-secops-with-mitre-attck</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/secops.png</image:loc><image:caption>secops</image:caption><image:title>secops</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MITRE-5-Steps-Screen.png</image:loc><image:caption>MITRE5StepsScreen</image:caption><image:title>MITRE5StepsScreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-the-anydesk-breach-aftermath</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/activemq-blog-featured.png</image:loc><image:caption>activemqblogfeatured</image:caption><image:title>activemqblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/elena-odier.png</image:loc><image:caption>elenaodier</image:caption><image:title>elenaodier</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/anydesk-breach-blog-1.png</image:loc><image:caption>anydeskbreachblog1</image:caption><image:title>anydeskbreachblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/anydesk-breach-blog-1a.png</image:loc><image:caption>anydeskbreachblog1a</image:caption><image:title>anydeskbreachblog1a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/anydesk-breach-blog-3.png</image:loc><image:caption>anydeskbreachblog3</image:caption><image:title>anydeskbreachblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/anydesk-breach-blog-featured.png</image:loc><image:caption>anydeskbreachblogfeatured</image:caption><image:title>anydeskbreachblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(8).png</image:loc><image:caption>BLOGImagesTemplatev28</image:caption><image:title>BLOGImagesTemplatev28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/darren-singh.png</image:loc><image:caption>darrensingh</image:caption><image:title>darrensingh</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/anydesk-breach-blog-2.png</image:loc><image:caption>anydeskbreachblog2</image:caption><image:title>anydeskbreachblog2</image:title></image:image><lastmod>2024-03-26</lastmod></url><url><loc>https://www.cybereason.com/blog/net-support-rat-wordpress-clickfix</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image4.png</image:loc><image:caption>image4</image:caption><image:title>image4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image24.png</image:loc><image:caption>image24</image:caption><image:title>image24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image19.jpg</image:loc><image:caption>image19</image:caption><image:title>image19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(23).png</image:loc><image:caption>BLOGImagesTemplatev223</image:caption><image:title>BLOGImagesTemplatev223</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image2.png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image1.png</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image17.jpg</image:loc><image:caption>image17</image:caption><image:title>image17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image25.png</image:loc><image:caption>image25</image:caption><image:title>image25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image13.png</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image6.png</image:loc><image:caption>image6</image:caption><image:title>image6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/citrixbleed-featured-image.png</image:loc><image:caption>citrixbleedfeaturedimage</image:caption><image:title>citrixbleedfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image9.png</image:loc><image:caption>image9</image:caption><image:title>image9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image20.png</image:loc><image:caption>image20</image:caption><image:title>image20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image12.png</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image18.png</image:loc><image:caption>image18</image:caption><image:title>image18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image14.png</image:loc><image:caption>image14</image:caption><image:title>image14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image26.png</image:loc><image:caption>image26</image:caption><image:title>image26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image21.png</image:loc><image:caption>image21</image:caption><image:title>image21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image10.png</image:loc><image:caption>image10</image:caption><image:title>image10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image11.png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/NetSupport/image22.png</image:loc><image:caption>image22</image:caption><image:title>image22</image:title></image:image><lastmod>2025-07-09</lastmod></url><url><loc>https://www.cybereason.com/blog/how-to-design-a-prevention-stack-to-stop-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/virtual-city-1.png</image:loc><image:caption>virtualcity1</image:caption><image:title>virtualcity1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/5%20steps%20to%20more%20effective%20ransomware%20response.png</image:loc><image:caption>5stepstomoreeffectiveransomwareresponse</image:caption><image:title>5stepstomoreeffectiveransomwareresponse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(20)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews201</image:caption><image:title>CopyofBLOGSOCIALSETNews201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Noa%20Katsovich.jpg</image:loc><image:caption>NoaKatsovich</image:caption><image:title>NoaKatsovich</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/press/wall-street-journal-names-cybereason-top-25-technology-company-</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-black-hat-live-military-grade-prevention-detection-and-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(21).png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/full-width-image-for-military-grade-blog1-1000x391.jpg</image:loc><image:caption>fullwidthimageformilitarygradeblog11000x391</image:caption><image:title>fullwidthimageformilitarygradeblog11000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><lastmod>2018-01-24</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-october-26th-2022-ngav-redefined</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/ysa-circle-hs.png</image:loc><image:caption>ysacirclehs</image:caption><image:title>ysacirclehs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/cody-circle-headshot.png</image:loc><image:caption>codycircleheadshot</image:caption><image:title>codycircleheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113218.959.png</image:loc><image:caption>blogposttext20220920T113218959</image:caption><image:title>blogposttext20220920T113218959</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/tim-amey-hs-circle.png</image:loc><image:caption>timameyhscircle</image:caption><image:title>timameyhscircle</image:title></image:image><lastmod>2022-09-21</lastmod></url><url><loc>https://www.cybereason.com/blog/running-robust-managed-detection-and-response-services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(47).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews47</image:caption><image:title>CopyofBLOGSOCIALSETNews47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Black%20Basta%20Threat%20Alert.png</image:loc><image:caption>BlackBastaThreatAlert</image:caption><image:title>BlackBastaThreatAlert</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-2.png</image:loc><image:caption>image22</image:caption><image:title>image22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-2.png</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CopyofCybereasonBlogHeroTemplate1</image:caption><image:title>CopyofCybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-10-04</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs.-whispergate-wiper</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Feb-15-2022-06-16-38-91-PM.png</image:loc><image:caption>image1Feb15202206163891PM</image:caption><image:title>image1Feb15202206163891PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Feb-15-2022-06-16-05-09-PM.png</image:loc><image:caption>image2Feb15202206160509PM</image:caption><image:title>image2Feb15202206160509PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Lior%20R-1.png</image:loc><image:caption>LiorR1</image:caption><image:title>LiorR1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Feb-15-2022-06-17-10-31-PM.png</image:loc><image:caption>image3Feb15202206171031PM</image:caption><image:title>image3Feb15202206171031PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/this-simple-tweak-is-one-of-the-best-ways-to-protect-your-windows-computer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/resources/attackers-include-ransom-note-in-amplified-ddos-attacks-that-use-memcached-servers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_317647181-1.jpg</image:loc><image:caption>shutterstock3176471811</image:caption><image:title>shutterstock3176471811</image:title></image:image><lastmod>2018-04-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecurity-statistics-and-predictions-for-2023</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CXO%20Today%20logo.jpg</image:loc><image:caption>CXOTodaylogo</image:caption><image:title>CXOTodaylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2023-01-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-roots-of-evil-ransomware-pt.-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20(5).png</image:loc><image:caption>BLOG5</image:caption><image:title>BLOG5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Metropolitan_Police_ransomware_scam.jpg</image:loc><image:caption>MetropolitanPoliceransomwarescam</image:caption><image:title>MetropolitanPoliceransomwarescam</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(1).png</image:loc><image:caption>MaliciousLifeTemplate1</image:caption><image:title>MaliciousLifeTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/130%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>130MALICIOUSLIFE</image:caption><image:title>130MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Uri%20Sternfeld%20Credit%20Tanya%20Yakovleva.jpeg</image:loc><image:caption>UriSternfeldCreditTanyaYakovleva</image:caption><image:title>UriSternfeldCreditTanyaYakovleva</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Wana_Decrypt0r_screenshot-1.png</image:loc><image:caption>WanaDecrypt0rscreenshot1</image:caption><image:title>WanaDecrypt0rscreenshot1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-secret-to-mixing-marketing-with-politics</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ClickZ.png</image:loc><image:caption>ClickZ</image:caption><image:title>ClickZ</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/terms/specialterms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-02-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/softbank-invests-100-million-in-security-startup-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Untitled-design-9.jpg</image:loc><image:caption>Untitleddesign9</image:caption><image:title>Untitleddesign9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-integrates-lockheed-martin-threat-intelligence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-27</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-commissions-2017-threat-hunting-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ukraine-assembles-it-army-to-perform-ddos-on-russia</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Mar-01-2022-11-24-03-61-PM.png</image:loc><image:caption>BankinfosecuritylogoMar01202211240361PM</image:caption><image:title>BankinfosecuritylogoMar01202211240361PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-04-03</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-labs-reports-on-owa-backdoor-attack-the-take-home-message-for-cisos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(18).png</image:loc><image:caption>BLOGImagesTemplatev218</image:caption><image:title>BLOGImagesTemplatev218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/header_OWA.png</image:loc><image:caption>headerOWA</image:caption><image:title>headerOWA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/verizon-dbir-2015-takeaways-cybereason-edition</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(14).png</image:loc><image:caption>BLOGImagesTemplatev214</image:caption><image:title>BLOGImagesTemplatev214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/DBIR-graphic-1.png</image:loc><image:caption>DBIRgraphic1</image:caption><image:title>DBIRgraphic1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-featured-in-gartners-endpoint-detection-and-response-tools-competitive-landscape</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8481.png</image:loc><image:caption>IMG8481</image:caption><image:title>IMG8481</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-vs-cloud-blog.png</image:loc><image:caption>onpremvscloudblog</image:caption><image:title>onpremvscloudblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/the-boston-globe-recognizes-cybereason-as-a-top-place-to-work-in-2020</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-office-2.jpg</image:loc><image:caption>cybereasonoffice2</image:caption><image:title>cybereasonoffice2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/blog/cve-2025-23006-sonicwall-critical-vulnerability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_SonicWall.png</image:loc><image:caption>BLOGImagesSonicWall</image:caption><image:title>BLOGImagesSonicWall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(1).png</image:loc><image:caption>BLOGImagesTemplatev21</image:caption><image:title>BLOGImagesTemplatev21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(24).png</image:loc><image:caption>BLOGImagesTemplatev224</image:caption><image:title>BLOGImagesTemplatev224</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2025-01-24</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/maggie-macalpine</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/maggie-macalpine.png</image:loc><image:caption>maggiemacalpine</image:caption><image:title>maggiemacalpine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/commonspirit-still-dealing-with-after-effects-of-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WKTY-TV%20logo.jpg</image:loc><image:caption>WKTYTVlogo</image:caption><image:title>WKTYTVlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2022-10-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-are-ad-blockers-malicious</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/52%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>52MALICIOUSLIFE</image:caption><image:title>52MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/consulting</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-preventid-flipped.png</image:loc><image:caption>crowlshowcasepreventidflipped</image:caption><image:title>crowlshowcasepreventidflipped</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dave-LI.jpg</image:loc><image:caption>DaveLI</image:caption><image:title>DaveLI</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(36).png</image:loc><image:caption>BLOGImagesTemplatev236</image:caption><image:title>BLOGImagesTemplatev236</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/michael-quinn.webp</image:loc><image:caption>michaelquinn</image:caption><image:title>michaelquinn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20consulting%20infographic.png</image:loc><image:caption>cybereasonconsultinginfographic</image:caption><image:title>cybereasonconsultinginfographic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Mitre%20Blog%202026.png</image:loc><image:caption>CybereasonMitreBlog2026</image:caption><image:title>CybereasonMitreBlog2026</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/denman-headshot.png</image:loc><image:caption>denmanheadshot</image:caption><image:title>denmanheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-ransomware-hero-preventid-v2.jpg</image:loc><image:caption>crransomwareheropreventidv2</image:caption><image:title>crransomwareheropreventidv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owls-all--posed-trans.png</image:loc><image:caption>crowlsallposedtrans</image:caption><image:title>crowlsallposedtrans</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/derek-rieck.png</image:loc><image:caption>derekrieck</image:caption><image:title>derekrieck</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/iconsand.png</image:loc><image:caption>iconsand</image:caption><image:title>iconsand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/5.jpeg</image:loc><image:caption>5</image:caption><image:title>5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ben-demonte.jpg</image:loc><image:caption>bendemonte</image:caption><image:title>bendemonte</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DurrantProfilePic2025.png</image:loc><image:caption>DurrantProfilePic2025</image:caption><image:title>DurrantProfilePic2025</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-spine-bg--posture-incident-management-d.jpg</image:loc><image:caption>crplatformspinebgpostureincidentmanagementd</image:caption><image:title>crplatformspinebgpostureincidentmanagementd</image:title></image:image><lastmod>2025-08-20</lastmod></url><url><loc>https://www.cybereason.com/press/introducing-cybereason-xdr-future-ready-attack-protection-that-ends-cyber-attacks-from-endpoints-to-everywhere</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/holiday-weekend-ransomware-attacks-pose-threats-to-healthcare-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Health%20IT%20Security%20logo.png</image:loc><image:caption>HealthITSecuritylogo</image:caption><image:title>HealthITSecuritylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/whats-new-with-ransomware-gangs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(13).png</image:loc><image:caption>blogposttext13</image:caption><image:title>blogposttext13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-27T072602.816.png</image:loc><image:caption>blogposttext20220727T072602816</image:caption><image:title>blogposttext20220727T072602816</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-05T080649.580.png</image:loc><image:caption>blogposttext20220705T080649580</image:caption><image:title>blogposttext20220705T080649580</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-07-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/apple-security-shock-as-mac-threats-outpace-microsoft-windows-by-2-to-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes-3.jpg</image:loc><image:caption>Forbes3</image:caption><image:title>Forbes3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-02-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-2022-trends-and-predictions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITWeb%20logo-2.png</image:loc><image:caption>ITWeblogo2</image:caption><image:title>ITWeblogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/paul-roberts-interviews-ross-rustici-about-cybereasons-energy-grid-honeynet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Ledger.png</image:loc><image:caption>SecurityLedger</image:caption><image:title>SecurityLedger</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2018-08-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-silent-firewalls-the-underrepresentation-of-women-in-cyber</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Keren-Elazari.jpg</image:loc><image:caption>KerenElazari</image:caption><image:title>KerenElazari</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/square%20headshots/Aoibh_Wood-min.png</image:loc><image:caption>AoibhWoodmin</image:caption><image:title>AoibhWoodmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-225-Card.png</image:loc><image:caption>MLEp225Card</image:caption><image:title>MLEp225Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-north-koreas-hackers-became-dangerously-good</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wall-street-journal-logo.png</image:loc><image:caption>wallstreetjournallogo</image:caption><image:title>wallstreetjournallogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-04-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/inside-the-hq-of-cybereason-softbanks-top-funded-cybersecurity-startup</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-segwit2x-part-3</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/82%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>82MALICIOUSLIFE</image:caption><image:title>82MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Andreas-M-Antonopoulos-2.jpeg</image:loc><image:caption>AndreasMAntonopoulos2</image:caption><image:title>AndreasMAntonopoulos2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/prevent-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-abstract-black-yellow-pattern-03.jpg</image:loc><image:caption>crbgabstractblackyellowpattern03</image:caption><image:title>crbgabstractblackyellowpattern03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/holiday-ebook-infogrphc-sm.png</image:loc><image:caption>holidayebookinfogrphcsm</image:caption><image:title>holidayebookinfogrphcsm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/PreventID-Ransomware-LP-Card.png</image:loc><image:caption>PreventIDRansomwareLPCard</image:caption><image:title>PreventIDRansomwareLPCard</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/apt-fact-versus-fiction-part-one</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_271690892-1024x391.jpg</image:loc><image:caption>shutterstock2716908921024x391</image:caption><image:title>shutterstock2716908921024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(32)-1.png</image:loc><image:caption>CybereasonBlogTemplate321</image:caption><image:title>CybereasonBlogTemplate321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(38)-1.png</image:loc><image:caption>CybereasonBlogTemplate381</image:caption><image:title>CybereasonBlogTemplate381</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/blog/research/new-ursnif-variant-targets-japan-packed-with-new-features</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Dec-06-2021-05-26-28-05-PM.png</image:loc><image:caption>image8Dec06202105262805PM</image:caption><image:title>image8Dec06202105262805PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image29-2.png</image:loc><image:caption>image292</image:caption><image:title>image292</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Dec-06-2021-05-36-33-28-PM.png</image:loc><image:caption>image4Dec06202105363328PM</image:caption><image:title>image4Dec06202105363328PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(96).png</image:loc><image:caption>blogposttext96</image:caption><image:title>blogposttext96</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Dec-06-2021-05-20-10-22-PM.png</image:loc><image:caption>image12Dec06202105201022PM</image:caption><image:title>image12Dec06202105201022PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-Dec-06-2021-05-41-39-84-PM.png</image:loc><image:caption>image21Dec06202105413984PM</image:caption><image:title>image21Dec06202105413984PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image25-4.png</image:loc><image:caption>image254</image:caption><image:title>image254</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image28-4.png</image:loc><image:caption>image284</image:caption><image:title>image284</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(1)-1.png</image:loc><image:caption>pastedimage011</image:caption><image:title>pastedimage011</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-Dec-06-2021-04-58-17-01-PM.png</image:loc><image:caption>image17Dec06202104581701PM</image:caption><image:title>image17Dec06202104581701PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Dec-06-2021-05-19-33-96-PM.png</image:loc><image:caption>image9Dec06202105193396PM</image:caption><image:title>image9Dec06202105193396PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image39-1.png</image:loc><image:caption>image391</image:caption><image:title>image391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image38-2.png</image:loc><image:caption>image382</image:caption><image:title>image382</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image31-4.png</image:loc><image:caption>image314</image:caption><image:title>image314</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image30-3.png</image:loc><image:caption>image303</image:caption><image:title>image303</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image43-2.png</image:loc><image:caption>image432</image:caption><image:title>image432</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image55.png</image:loc><image:caption>image55</image:caption><image:title>image55</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image49-1.png</image:loc><image:caption>image491</image:caption><image:title>image491</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Dec-06-2021-05-44-50-59-PM.png</image:loc><image:caption>image7Dec06202105445059PM</image:caption><image:title>image7Dec06202105445059PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image47-1.png</image:loc><image:caption>image471</image:caption><image:title>image471</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image41-2.png</image:loc><image:caption>image412</image:caption><image:title>image412</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image44-1.png</image:loc><image:caption>image441</image:caption><image:title>image441</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image35-4.png</image:loc><image:caption>image354</image:caption><image:title>image354</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image46-1.png</image:loc><image:caption>image461</image:caption><image:title>image461</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image37-2.png</image:loc><image:caption>image372</image:caption><image:title>image372</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image51.png</image:loc><image:caption>image51</image:caption><image:title>image51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image50-1.png</image:loc><image:caption>image501</image:caption><image:title>image501</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image34-3.png</image:loc><image:caption>image343</image:caption><image:title>image343</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image45-1.png</image:loc><image:caption>image451</image:caption><image:title>image451</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image33-Dec-06-2021-05-37-16-00-PM.png</image:loc><image:caption>image33Dec06202105371600PM</image:caption><image:title>image33Dec06202105371600PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Dec-06-2021-05-17-01-59-PM.png</image:loc><image:caption>image15Dec06202105170159PM</image:caption><image:title>image15Dec06202105170159PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image53.png</image:loc><image:caption>image53</image:caption><image:title>image53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image32-3.png</image:loc><image:caption>image323</image:caption><image:title>image323</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Dec-06-2021-05-09-07-18-PM.png</image:loc><image:caption>image5Dec06202105090718PM</image:caption><image:title>image5Dec06202105090718PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image54.png</image:loc><image:caption>image54</image:caption><image:title>image54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-Dec-06-2021-05-18-50-79-PM.png</image:loc><image:caption>image24Dec06202105185079PM</image:caption><image:title>image24Dec06202105185079PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image36-3.png</image:loc><image:caption>image363</image:caption><image:title>image363</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image52.png</image:loc><image:caption>image52</image:caption><image:title>image52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image48-1.png</image:loc><image:caption>image481</image:caption><image:title>image481</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-Dec-06-2021-05-11-55-09-PM.png</image:loc><image:caption>image19Dec06202105115509PM</image:caption><image:title>image19Dec06202105115509PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image22-Dec-06-2021-05-45-27-68-PM.png</image:loc><image:caption>image22Dec06202105452768PM</image:caption><image:title>image22Dec06202105452768PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Dec-06-2021-05-22-19-53-PM.png</image:loc><image:caption>image2Dec06202105221953PM</image:caption><image:title>image2Dec06202105221953PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Dec-06-2021-05-03-19-99-PM.png</image:loc><image:caption>image1Dec06202105031999PM</image:caption><image:title>image1Dec06202105031999PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Dec-06-2021-05-05-27-44-PM.png</image:loc><image:caption>image16Dec06202105052744PM</image:caption><image:title>image16Dec06202105052744PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Dec-06-2021-05-06-03-71-PM.png</image:loc><image:caption>image14Dec06202105060371PM</image:caption><image:title>image14Dec06202105060371PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Dec-06-2021-05-47-54-89-PM.png</image:loc><image:caption>image11Dec06202105475489PM</image:caption><image:title>image11Dec06202105475489PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27-Dec-06-2021-05-22-52-94-PM.png</image:loc><image:caption>image27Dec06202105225294PM</image:caption><image:title>image27Dec06202105225294PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image40-2.png</image:loc><image:caption>image402</image:caption><image:title>image402</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-Dec-06-2021-05-34-04-48-PM.png</image:loc><image:caption>image20Dec06202105340448PM</image:caption><image:title>image20Dec06202105340448PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Dec-06-2021-04-59-05-14-PM.png</image:loc><image:caption>image13Dec06202104590514PM</image:caption><image:title>image13Dec06202104590514PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Dec-06-2021-05-32-35-33-PM.png</image:loc><image:caption>image3Dec06202105323533PM</image:caption><image:title>image3Dec06202105323533PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Dec-06-2021-05-10-01-18-PM.png</image:loc><image:caption>image10Dec06202105100118PM</image:caption><image:title>image10Dec06202105100118PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image26-3.png</image:loc><image:caption>image263</image:caption><image:title>image263</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-Dec-06-2021-05-40-51-17-PM.png</image:loc><image:caption>image23Dec06202105405117PM</image:caption><image:title>image23Dec06202105405117PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image42-1.png</image:loc><image:caption>image421</image:caption><image:title>image421</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(2)-1.png</image:loc><image:caption>pastedimage021</image:caption><image:title>pastedimage021</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Dec-06-2021-05-08-25-85-PM.png</image:loc><image:caption>image6Dec06202105082585PM</image:caption><image:title>image6Dec06202105082585PM</image:title></image:image><lastmod>2023-06-07</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-receives-bostinno-50-on-fire-and-inno-blazer-awards</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-20</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-at-black-hat-thinking-like-a-hacker</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Black-Hat-USA-Conference-2015.png</image:loc><image:caption>BlackHatUSAConference2015</image:caption><image:title>BlackHatUSAConference2015</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/unnamed-1.png</image:loc><image:caption>unnamed1</image:caption><image:title>unnamed1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-mdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cybereason-mdr-service-brief-thumbnail.jpg</image:loc><image:caption>cybereasonmdrservicebriefthumbnail</image:caption><image:title>cybereasonmdrservicebriefthumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-10-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-black-basta-ransomware-campaign-is-actively-targeting-us-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Silicon%20Angle%20logo-2.png</image:loc><image:caption>SiliconAnglelogo2</image:caption><image:title>SiliconAnglelogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/ever-evolving-cybereason-cso-sam-curry-on-security-and-leadership</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Ever-Evolving-sam-Curry-Card.png</image:loc><image:caption>EverEvolvingsamCurryCard</image:caption><image:title>EverEvolvingsamCurryCard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202017/Sam-Headshot.jpg</image:loc><image:caption>SamHeadshot</image:caption><image:title>SamHeadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(2).png</image:loc><image:caption>CybereasonBlogtemplate2</image:caption><image:title>CybereasonBlogtemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3)-2.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews32</image:caption><image:title>CopyofBLOGSOCIALSETNews32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/blog/5-predictions-for-cybersecurity-in-2018</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Timeline-HighRes.png</image:loc><image:caption>TimelineHighRes</image:caption><image:title>TimelineHighRes</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MATAN.jpeg</image:loc><image:caption>MATAN</image:caption><image:title>MATAN</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eoy.png</image:loc><image:caption>eoy</image:caption><image:title>eoy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/royal-ransomware-group-attacks-surge-with-healthcare-a-prime-target</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Silicon%20Angle%20logo-Dec-14-2022-07-23-46-3546-PM.png</image:loc><image:caption>SiliconAnglelogoDec1420220723463546PM</image:caption><image:title>SiliconAnglelogoDec1420220723463546PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-12-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/five-ways-to-assess-risk-as-the-russia-ukraine-conflict-heats-up</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Mar-01-2022-11-03-56-57-PM.png</image:loc><image:caption>SCMagazinelogoMar01202211035657PM</image:caption><image:title>SCMagazinelogoMar01202211035657PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/rsa-2020-10-ways-msps-can-improve-ransomware-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN-Logo-7.png</image:loc><image:caption>CRNLogo7</image:caption><image:title>CRNLogo7</image:title></image:image><lastmod>2020-03-02</lastmod></url><url><loc>https://www.cybereason.com/blog/lockheed-martin-and-cybereason-live-webinar-the-untold-secrets-for-fighting-advanced-persistent-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(4).png</image:loc><image:caption>Maliciouslifepodcast4</image:caption><image:title>Maliciouslifepodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/webinar-a-03-1024x391.png</image:loc><image:caption>webinara031024x391</image:caption><image:title>webinara031024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(8).png</image:loc><image:caption>MaliciousLifeepisode8</image:caption><image:title>MaliciousLifeepisode8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-next-gen-cybersecurity-company-of-the-year</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-operation-softcell</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/liordiv-1.png</image:loc><image:caption>liordiv1</image:caption><image:title>liordiv1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mor%20levi-1.png</image:loc><image:caption>morlevi1</image:caption><image:title>morlevi1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gI_67392_Amit%20Serper%20Photo%202016.png</image:loc><image:caption>gI67392AmitSerperPhoto2016</image:caption><image:title>gI67392AmitSerperPhoto2016</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(8).png</image:loc><image:caption>MaliciousLifeepisode8</image:caption><image:title>MaliciousLifeepisode8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/50%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>50MALICIOUSLIFE</image:caption><image:title>50MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/black-basta-ransomware-gang-attacks-50-companies-cybereason-reports</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-Jul-20-2022-02-48-55-31-AM.png</image:loc><image:caption>MSSPAlertlogoJul20202202485531AM</image:caption><image:title>MSSPAlertlogoJul20202202485531AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/blog/ai-driven-cybereason-xdr-and-edr-now-available-on-google-cloud-marketplace</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(32)-1.png</image:loc><image:caption>CybereasonBlogTemplate321</image:caption><image:title>CybereasonBlogTemplate321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(92).png</image:loc><image:caption>blogposttext92</image:caption><image:title>blogposttext92</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(38)-1.png</image:loc><image:caption>CybereasonBlogTemplate381</image:caption><image:title>CybereasonBlogTemplate381</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2022-03-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/this-easy-to-use-information-stealing-trojan-malware-is-gaining-popularity-among-cyber-criminals</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zdnet-1.png</image:loc><image:caption>zdnet1</image:caption><image:title>zdnet1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-11-05</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-gan-and-deep-fakes-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/65%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>65MALICIOUSLIFE</image:caption><image:title>65MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(32).png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1516247335672.jpeg</image:loc><image:caption>1516247335672</image:caption><image:title>1516247335672</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-launches-dfir-solution-to-automate-incident-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-May-09-2022-03-49-29-92-PM.png</image:loc><image:caption>CSOMagazinelogoMay09202203492992PM</image:caption><image:title>CSOMagazinelogoMay09202203492992PM</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/china-backed-hackers-linked-to-news-corp-cyber-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITPro%20logo-Feb-10-2022-03-48-02-53-PM.png</image:loc><image:caption>ITPrologoFeb10202203480253PM</image:caption><image:title>ITPrologoFeb10202203480253PM</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-offers-comprehensive-visibility-and-protection-for-diverse-systems</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(2)-2.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews22</image:caption><image:title>CopyofBLOGSOCIALSETNews22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/chaim-resized.jpeg</image:loc><image:caption>chaimresized</image:caption><image:title>chaimresized</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-08-17</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-whats-in-a-name</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/download%20(2)-1.png</image:loc><image:caption>download21</image:caption><image:title>download21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(53).png</image:loc><image:caption>blogposttext53</image:caption><image:title>blogposttext53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(108).png</image:loc><image:caption>blogposttext108</image:caption><image:title>blogposttext108</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware-shifting-to-cloud.png</image:loc><image:caption>Ransomwareshiftingtocloud</image:caption><image:title>Ransomwareshiftingtocloud</image:title></image:image><lastmod>2022-05-18</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-expands-globally-brings-real-time-threat-detection-to-japan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-how-is-spyware-legal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Lodrina-1.jpg</image:loc><image:caption>Lodrina1</image:caption><image:title>Lodrina1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/57%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>57MALICIOUSLIFE</image:caption><image:title>57MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/press/dave-dewalt-joins-cybereason-as-vice-chairman-of-its-advisory-board</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-01-16</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-gold-rush</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CyberSec%20Asia%20logo-1.png</image:loc><image:caption>CyberSecAsialogo1</image:caption><image:title>CyberSecAsialogo1</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/blog/research/strifewater-rat-iranian-apt-moses-staff-adds-new-trojan-to-ransomware-operations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Jan-18-2022-05-20-01-22-PM.png</image:loc><image:caption>image4Jan18202205200122PM</image:caption><image:title>image4Jan18202205200122PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Jan-18-2022-05-27-15-07-PM.png</image:loc><image:caption>image7Jan18202205271507PM</image:caption><image:title>image7Jan18202205271507PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Jan-18-2022-05-28-22-23-PM.png</image:loc><image:caption>image10Jan18202205282223PM</image:caption><image:title>image10Jan18202205282223PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Jan-18-2022-05-22-55-45-PM.png</image:loc><image:caption>image12Jan18202205225545PM</image:caption><image:title>image12Jan18202205225545PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tom%20Fakterman.png</image:loc><image:caption>TomFakterman</image:caption><image:title>TomFakterman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Jan-18-2022-05-20-48-69-PM.png</image:loc><image:caption>image6Jan18202205204869PM</image:caption><image:title>image6Jan18202205204869PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Jan-18-2022-05-30-46-61-PM.png</image:loc><image:caption>image2Jan18202205304661PM</image:caption><image:title>image2Jan18202205304661PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Jan-18-2022-05-26-23-53-PM.png</image:loc><image:caption>image3Jan18202205262353PM</image:caption><image:title>image3Jan18202205262353PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Jan-18-2022-05-29-46-33-PM.png</image:loc><image:caption>image14Jan18202205294633PM</image:caption><image:title>image14Jan18202205294633PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Jan-18-2022-05-21-58-16-PM.png</image:loc><image:caption>image11Jan18202205215816PM</image:caption><image:title>image11Jan18202205215816PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Jan-18-2022-05-29-03-78-PM.png</image:loc><image:caption>image8Jan18202205290378PM</image:caption><image:title>image8Jan18202205290378PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Jan-18-2022-05-32-37-44-PM.png</image:loc><image:caption>image5Jan18202205323744PM</image:caption><image:title>image5Jan18202205323744PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Jan-18-2022-05-31-40-64-PM.png</image:loc><image:caption>image9Jan18202205314064PM</image:caption><image:title>image9Jan18202205314064PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Jan-18-2022-05-24-57-88-PM.png</image:loc><image:caption>image13Jan18202205245788PM</image:caption><image:title>image13Jan18202205245788PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Jan-18-2022-05-24-09-00-PM.png</image:loc><image:caption>image1Jan18202205240900PM</image:caption><image:title>image1Jan18202205240900PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/complex-ransomops-fuel-explosion-in-2021-ransomware-economy-reveals-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechX%20Media%20logo.jpg</image:loc><image:caption>TechXMedialogo</image:caption><image:title>TechXMedialogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/elon-musk-sidekick-ex-juniper-exec-leads-new-batch-of-security-startups</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/network_world.jpg</image:loc><image:caption>networkworld</image:caption><image:title>networkworld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/three-reasons-why-you-should-never-pay-ransomware-attackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware.png</image:loc><image:caption>ransomware</image:caption><image:title>ransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(38).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews38</image:caption><image:title>CopyofBLOGSOCIALSETNews38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-1.png</image:loc><image:caption>CybereasonBlogTemplate201</image:caption><image:title>CybereasonBlogTemplate201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-protect-your-google-deployment-with-cybereason-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/google-deployment-xdr-cover.png</image:loc><image:caption>googledeploymentxdrcover</image:caption><image:title>googledeploymentxdrcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2022-06-16</lastmod></url><url><loc>https://www.cybereason.com/blog/legacy-av-is-so-last-year</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Symantec_LandingPage_Banner-8.png</image:loc><image:caption>SymantecLandingPageBanner8</image:caption><image:title>SymantecLandingPageBanner8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/symantec-blog-1.png</image:loc><image:caption>symantecblog1</image:caption><image:title>symantecblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-no-senior-management-buy-in-no-success</loc><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(10)-1.png</image:loc><image:caption>CISOStoriestemplate101</image:caption><image:title>CISOStoriestemplate101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(2).png</image:loc><image:caption>CISOStoriespodcast2</image:caption><image:title>CISOStoriespodcast2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chris%20Apgar.png</image:loc><image:caption>ChrisApgar</image:caption><image:title>ChrisApgar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(3).png</image:loc><image:caption>CISOStoriespodcast3</image:caption><image:title>CISOStoriespodcast3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-01-25</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-inside-clearview-ai-facial-recognition</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(14).png</image:loc><image:caption>MaliciousLifeepisode14</image:caption><image:title>MaliciousLifeepisode14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yossi-CB2021.png</image:loc><image:caption>YossiCB2021</image:caption><image:title>YossiCB2021</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/98%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>98MALICIOUSLIFE</image:caption><image:title>98MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-approaches-fresh-thinking-how-deep-is-going-to-be-the-countrys-most-elite-security-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/venturefizzlogo.png</image:loc><image:caption>venturefizzlogo</image:caption><image:title>venturefizzlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-trends-six-notable-ransomware-attacks-from-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(14).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews14</image:caption><image:title>CopyofBLOGSOCIALSETNews14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(6).png</image:loc><image:caption>CybereasonBlogTemplate6</image:caption><image:title>CybereasonBlogTemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130836.455.png</image:loc><image:caption>blogposttext20220926T130836455</image:caption><image:title>blogposttext20220926T130836455</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-alert-solarmarker-backdoor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-06-51-30-96-PM.png</image:loc><image:caption>unnamedSep14202106513096PM</image:caption><image:title>unnamedSep14202106513096PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/darkgate-featured.png</image:loc><image:caption>darkgatefeatured</image:caption><image:title>darkgatefeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-06-48-32-19-PM.png</image:loc><image:caption>unnamedSep14202106483219PM</image:caption><image:title>unnamedSep14202106483219PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-06-53-10-87-PM.png</image:loc><image:caption>unnamedSep14202106531087PM</image:caption><image:title>unnamedSep14202106531087PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-53-53-18-PM.png</image:loc><image:caption>unnamedSep14202108535318PM</image:caption><image:title>unnamedSep14202108535318PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-21T133543.854.png</image:loc><image:caption>blogposttext20220621T133543854</image:caption><image:title>blogposttext20220621T133543854</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(4).png</image:loc><image:caption>CopyofThreatAlertAnalysis4</image:caption><image:title>CopyofThreatAlertAnalysis4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-55-30-03-PM.png</image:loc><image:caption>unnamedSep14202108553003PM</image:caption><image:title>unnamedSep14202108553003PM</image:title></image:image><lastmod>2022-04-11</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-new-soc-webinar-series-is-helping-it-teams-protect-it-all</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-02-12</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-labs-dissecting-domain-generation-algorithms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/domain_feature.jpg</image:loc><image:caption>domainfeature</image:caption><image:title>domainfeature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Uri%20Sternfeld.jpeg</image:loc><image:caption>UriSternfeld</image:caption><image:title>UriSternfeld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-07-10</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-osx-pirrit-the-tale-of-malicious-mac-adware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/134%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>134MALICIOUSLIFE1</image:caption><image:title>134MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20to%20Not%20Build%20a%20Cybersecurity%20Startup-1.png</image:loc><image:caption>HowtoNotBuildaCybersecurityStartup1</image:caption><image:title>HowtoNotBuildaCybersecurityStartup1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/unicorn-banner-011.png</image:loc><image:caption>unicornbanner011</image:caption><image:title>unicornbanner011</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-mdr-vs.-the-trickbot-gang</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/90%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>90MALICIOUSLIFE</image:caption><image:title>90MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomops-vs.-extended-detection-and-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-06T070615.090.png</image:loc><image:caption>blogposttext20220906T070615090</image:caption><image:title>blogposttext20220906T070615090</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-06T123240.080.png</image:loc><image:caption>blogposttext20220706T123240080</image:caption><image:title>blogposttext20220706T123240080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-19T122257.609.png</image:loc><image:caption>blogposttext20220919T122257609</image:caption><image:title>blogposttext20220919T122257609</image:title></image:image><lastmod>2022-09-06</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/jean-lethuillier</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jean%20Lethuillier.jpg</image:loc><image:caption>JeanLethuillier</image:caption><image:title>JeanLethuillier</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IWD%20blog%20Jean%20Lethuillier.png</image:loc><image:caption>IWDblogJeanLethuillier</image:caption><image:title>IWDblogJeanLethuillier</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fraud-alert-as-cyber-monday-sales-kick-off</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/infosecmag.jpg</image:loc><image:caption>infosecmag</image:caption><image:title>infosecmag</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-12-03</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-launches-free-emotet-locker-tool-to-help-global-organizations-and-local-and-state-governments-combat-emotet-malware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-01-28</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-guided-remediation-a-tailored-approach-for-enhanced-incident-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/remediation-screenshot-1024x391.jpg</image:loc><image:caption>remediationscreenshot1024x391</image:caption><image:title>remediationscreenshot1024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blank-avatar.png</image:loc><image:caption>blankavatar</image:caption><image:title>blankavatar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/oracle</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/BUSINESS_PROCESS_CR_ICONS_BATCH_2%20copy-19.svg</image:loc><image:caption>BUSINESSPROCESSCRICONSBATCH2copy19</image:caption><image:title>BUSINESSPROCESSCRICONSBATCH2copy19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/Cybereason%20Malop%20Overview%20Screen.png</image:loc><image:caption>CybereasonMalopOverviewScreen</image:caption><image:title>CybereasonMalopOverviewScreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/PoweredBy-OracleCloud-rgb.png</image:loc><image:caption>PoweredByOracleCloudrgb</image:caption><image:title>PoweredByOracleCloudrgb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/Cybereason%20Dashboard%20Aug%202020.png</image:loc><image:caption>CybereasonDashboardAug2020</image:caption><image:title>CybereasonDashboardAug2020</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malop%20details-1.png</image:loc><image:caption>Malopdetails1</image:caption><image:title>Malopdetails1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/MDR_CR_ICONS-23.svg</image:loc><image:caption>MDRCRICONS23</image:caption><image:title>MDRCRICONS23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/FILELESS_RANSOMWARE_PREVENTION_CLOUD_CR_ICONS-05.png</image:loc><image:caption>FILELESSRANSOMWAREPREVENTIONCLOUDCRICONS05</image:caption><image:title>FILELESSRANSOMWAREPREVENTIONCLOUDCRICONS05</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-12-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/nordic-choice-hotels-hit-by-conti-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Intelligent%20CISO%20logo-3.jpg</image:loc><image:caption>IntelligentCISOlogo3</image:caption><image:title>IntelligentCISOlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/best-security-research-2017</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/top-research.png</image:loc><image:caption>topresearch</image:caption><image:title>topresearch</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/eu-network-information-security-blog-featured.png</image:loc><image:caption>eunetworkinformationsecurityblogfeatured</image:caption><image:title>eunetworkinformationsecurityblogfeatured</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/resources/leverage-mitre-attack/webinar/us/072122</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/leverage-mitre-webinar-card-aoibh-cody.png</image:loc><image:caption>leveragemitrewebinarcardaoibhcody</image:caption><image:title>leveragemitrewebinarcardaoibhcody</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><lastmod>2022-07-21</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-how-to-hack-into-satellites</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/johannes.jpg</image:loc><image:caption>johannes</image:caption><image:title>johannes</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(31).png</image:loc><image:caption>MaliciousLifeepisode31</image:caption><image:title>MaliciousLifeepisode31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ML146_2.png</image:loc><image:caption>ML1462</image:caption><image:title>ML1462</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><lastmod>2024-05-28</lastmod></url><url><loc>https://www.cybereason.com/blog/what-modern-ransomware-looks-like</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T071524.894.png</image:loc><image:caption>blogposttext20220707T071524894</image:caption><image:title>blogposttext20220707T071524894</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/abstract-ethernet.jpg</image:loc><image:caption>abstractethernet</image:caption><image:title>abstractethernet</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-cryptocurrency-has-enabled-a-massive-surge-in-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Marketwatch%20logo.png</image:loc><image:caption>Marketwatchlogo</image:caption><image:title>Marketwatchlogo</image:title></image:image><lastmod>2021-05-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-lodrina-cherne-joins-panel-of-cybersecurity-experts-to-discuss-building-a-more-inclusive-future-in-an-aspen-tech-policy-hub-sponsored-discussion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-07-18</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-live-attack-simulation-ransomware-threat-hunter-series</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jj-hex-hs2.png</image:loc><image:caption>jjhexhs2</image:caption><image:title>jjhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(30).png</image:loc><image:caption>CybereasonBlogTemplate30</image:caption><image:title>CybereasonBlogTemplate30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Headshot%20image%20template%20(6).png</image:loc><image:caption>CopyofHeadshotimagetemplate6</image:caption><image:title>CopyofHeadshotimagetemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(7).png</image:loc><image:caption>CybereasonBlogTemplate7</image:caption><image:title>CybereasonBlogTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-10-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereasons-sam-curry-joins-nbc10-tv-boston-offering-advice-on-how-to-spot-cyber-scams-relating-to-the-ukraine-conflict</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NBC10-TV%20Boston.png</image:loc><image:caption>NBC10TVBoston</image:caption><image:title>NBC10TVBoston</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/newly-detected-strifewater-rat-linked-to-iranian-apt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-2.jpg</image:loc><image:caption>SecurityWeeklogo2</image:caption><image:title>SecurityWeeklogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-shamoon-the-biggest-hack-in-history</loc><image:image><image:loc>https://www.cybereason.com/hubfs/28%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>28MALICIOUSLIFE1</image:caption><image:title>28MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/blue-teaming-on-macos-with-eslogger</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T112617.289.png</image:loc><image:caption>blogposttext20221003T112617289</image:caption><image:title>blogposttext20221003T112617289</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Oct-03-2022-04-59-24-37-PM.png</image:loc><image:caption>image9Oct03202204592437PM</image:caption><image:title>image9Oct03202204592437PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Oct-03-2022-04-57-09-39-PM.png</image:loc><image:caption>image8Oct03202204570939PM</image:caption><image:title>image8Oct03202204570939PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Oct-03-2022-04-51-54-99-PM.png</image:loc><image:caption>image6Oct03202204515499PM</image:caption><image:title>image6Oct03202204515499PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Oct-03-2022-05-02-25-35-PM.png</image:loc><image:caption>image4Oct03202205022535PM</image:caption><image:title>image4Oct03202205022535PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Oct-03-2022-04-47-21-30-PM.png</image:loc><image:caption>image16Oct03202204472130PM</image:caption><image:title>image16Oct03202204472130PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Oct-03-2022-04-50-20-84-PM.png</image:loc><image:caption>image14Oct03202204502084PM</image:caption><image:title>image14Oct03202204502084PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Oct-03-2022-04-52-44-09-PM.png</image:loc><image:caption>image10Oct03202204524409PM</image:caption><image:title>image10Oct03202204524409PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Oct-03-2022-04-53-39-80-PM.png</image:loc><image:caption>image11Oct03202204533980PM</image:caption><image:title>image11Oct03202204533980PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Oct-03-2022-05-03-52-47-PM.png</image:loc><image:caption>image12Oct03202205035247PM</image:caption><image:title>image12Oct03202205035247PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Oct-03-2022-05-07-58-08-PM.png</image:loc><image:caption>image15Oct03202205075808PM</image:caption><image:title>image15Oct03202205075808PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Oct-03-2022-05-01-08-04-PM.png</image:loc><image:caption>image13Oct03202205010804PM</image:caption><image:title>image13Oct03202205010804PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Oct-03-2022-04-48-41-30-PM.png</image:loc><image:caption>image1Oct03202204484130PM</image:caption><image:title>image1Oct03202204484130PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Oct-03-2022-04-45-09-68-PM.png</image:loc><image:caption>image7Oct03202204450968PM</image:caption><image:title>image7Oct03202204450968PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Oct-03-2022-05-04-52-59-PM.png</image:loc><image:caption>image3Oct03202205045259PM</image:caption><image:title>image3Oct03202205045259PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Oct-03-2022-04-51-13-59-PM.png</image:loc><image:caption>image5Oct03202204511359PM</image:caption><image:title>image5Oct03202204511359PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(2).png</image:loc><image:caption>ImagefromiOS2</image:caption><image:title>ImagefromiOS2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Oct-03-2022-04-57-45-53-PM.png</image:loc><image:caption>image2Oct03202204574553PM</image:caption><image:title>image2Oct03202204574553PM</image:title></image:image><lastmod>2022-10-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/wannacry-code-prompts-north-korean-apt-theories-but-attribution-remains-iffy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-cybereason-vs.-darkside-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(30).png</image:loc><image:caption>blogposttext30</image:caption><image:title>blogposttext30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jason%20f%20headshot.png</image:loc><image:caption>jasonfheadshot</image:caption><image:title>jasonfheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Israel%20barak-1.png</image:loc><image:caption>Israelbarak1</image:caption><image:title>Israelbarak1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20%20SOCIAL%20SET%20.png</image:loc><image:caption>BLOGSOCIALSET</image:caption><image:title>BLOGSOCIALSET</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ross-rustici-provides-expert-commentary-on-cyberhacking-the-winter-olympics</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cbs-evening-news-globe-logo.jpg</image:loc><image:caption>cbseveningnewsglobelogo</image:caption><image:title>cbseveningnewsglobelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-03-07</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-dave-kennedy-on-the-history-of-derbycon</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(17).png</image:loc><image:caption>MaliciousLifeepisode17</image:caption><image:title>MaliciousLifeepisode17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/119%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>119MALICIOUSLIFE</image:caption><image:title>119MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(7)-1.png</image:loc><image:caption>pastedimage071</image:caption><image:title>pastedimage071</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ai-and-ml-hype-vs.-reality</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity-1.jpg</image:loc><image:caption>Bankinfosecurity1</image:caption><image:title>Bankinfosecurity1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2018-09-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecurity-experts-opine-on-confession-its-not-if-but-when-uk-is-attacked</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityBriefEU.png</image:loc><image:caption>SecurityBriefEU</image:caption><image:title>SecurityBriefEU</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/meet-the-futureproofed-edr-product-with-a-vision-for-where-the-market-is-still-going</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/Tunnel_1920x1080.jpg</image:loc><image:caption>Tunnel1920x1080</image:caption><image:title>Tunnel1920x1080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/services/remote-workforce-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PREVENTION_CR_ICONS-21.svg</image:loc><image:caption>PREVENTIONCRICONS21</image:caption><image:title>PREVENTIONCRICONS21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/Product%20Screens/Screenshot_Investigation.png</image:loc><image:caption>ScreenshotInvestigation</image:caption><image:title>ScreenshotInvestigation</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR3_CR_ICONS-22.svg</image:loc><image:caption>EDR3CRICONS22</image:caption><image:title>EDR3CRICONS22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR2_CR_ICONS-11.svg</image:loc><image:caption>EDR2CRICONS11</image:caption><image:title>EDR2CRICONS11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/rwp-datasheet-cover.png</image:loc><image:caption>rwpdatasheetcover</image:caption><image:title>rwpdatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-06-09</lastmod></url><url><loc>https://www.cybereason.com/blog/from-cracked-to-hacked-malware-spread-via-youtube-videos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/youtube-malware-blog-featured.png</image:loc><image:caption>youtubemalwareblogfeatured</image:caption><image:title>youtubemalwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-22.png</image:loc><image:caption>youtubemalwareblog22</image:caption><image:title>youtubemalwareblog22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-14.png</image:loc><image:caption>youtubemalwareblog14</image:caption><image:title>youtubemalwareblog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/hardbit-threat-analysis-featured.png</image:loc><image:caption>hardbitthreatanalysisfeatured</image:caption><image:title>hardbitthreatanalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-2.png</image:loc><image:caption>youtubemalwareblog2</image:caption><image:title>youtubemalwareblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-19.png</image:loc><image:caption>youtubemalwareblog19</image:caption><image:title>youtubemalwareblog19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-23.png</image:loc><image:caption>youtubemalwareblog23</image:caption><image:title>youtubemalwareblog23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-18.png</image:loc><image:caption>youtubemalwareblog18</image:caption><image:title>youtubemalwareblog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-3.png</image:loc><image:caption>youtubemalwareblog3</image:caption><image:title>youtubemalwareblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-1.png</image:loc><image:caption>youtubemalwareblog1</image:caption><image:title>youtubemalwareblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-8.png</image:loc><image:caption>youtubemalwareblog8</image:caption><image:title>youtubemalwareblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-15.png</image:loc><image:caption>youtubemalwareblog15</image:caption><image:title>youtubemalwareblog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Home%20Revamp%20Images/full-banner-bg-mobile.webp</image:loc><image:caption>fullbannerbgmobile</image:caption><image:title>fullbannerbgmobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-30.png</image:loc><image:caption>youtubemalwareblog30</image:caption><image:title>youtubemalwareblog30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-9.png</image:loc><image:caption>youtubemalwareblog9</image:caption><image:title>youtubemalwareblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-4.png</image:loc><image:caption>youtubemalwareblog4</image:caption><image:title>youtubemalwareblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-16.png</image:loc><image:caption>youtubemalwareblog16</image:caption><image:title>youtubemalwareblog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-6.png</image:loc><image:caption>youtubemalwareblog6</image:caption><image:title>youtubemalwareblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Ralph-Villanueva.png</image:loc><image:caption>RalphVillanueva</image:caption><image:title>RalphVillanueva</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-11.png</image:loc><image:caption>youtubemalwareblog11</image:caption><image:title>youtubemalwareblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-7.png</image:loc><image:caption>youtubemalwareblog7</image:caption><image:title>youtubemalwareblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-20.png</image:loc><image:caption>youtubemalwareblog20</image:caption><image:title>youtubemalwareblog20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-10.png</image:loc><image:caption>youtubemalwareblog10</image:caption><image:title>youtubemalwareblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-13.png</image:loc><image:caption>youtubemalwareblog13</image:caption><image:title>youtubemalwareblog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/behind-closed-doors-rise-of-remote-access-featured.png</image:loc><image:caption>behindcloseddoorsriseofremoteaccessfeatured</image:caption><image:title>behindcloseddoorsriseofremoteaccessfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-24.png</image:loc><image:caption>youtubemalwareblog24</image:caption><image:title>youtubemalwareblog24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-5.png</image:loc><image:caption>youtubemalwareblog5</image:caption><image:title>youtubemalwareblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-25.png</image:loc><image:caption>youtubemalwareblog25</image:caption><image:title>youtubemalwareblog25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-28.png</image:loc><image:caption>youtubemalwareblog28</image:caption><image:title>youtubemalwareblog28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-12.png</image:loc><image:caption>youtubemalwareblog12</image:caption><image:title>youtubemalwareblog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-26.png</image:loc><image:caption>youtubemalwareblog26</image:caption><image:title>youtubemalwareblog26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-17.png</image:loc><image:caption>youtubemalwareblog17</image:caption><image:title>youtubemalwareblog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-29.png</image:loc><image:caption>youtubemalwareblog29</image:caption><image:title>youtubemalwareblog29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-30-a.png</image:loc><image:caption>youtubemalwareblog30a</image:caption><image:title>youtubemalwareblog30a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/youtube-malware-blog-21.png</image:loc><image:caption>youtubemalwareblog21</image:caption><image:title>youtubemalwareblog21</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/whatsapp-hack-may-be-impossible-to-detect-on-your-phone</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Sun-1.gif</image:loc><image:caption>TheSun1</image:caption><image:title>TheSun1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/eu-us-privacy-shield-dissolution-what-happens-next</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-1.png</image:loc><image:caption>DarkReadinglogo1</image:caption><image:title>DarkReadinglogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-08-25</lastmod></url><url><loc>https://www.cybereason.com/blog/microsofts-failure-to-prioritize-security-puts-everyone-at-risk</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(17)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews171</image:caption><image:title>CopyofBLOGSOCIALSETNews171</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Artboard%201-2.png</image:loc><image:caption>Artboard12</image:caption><image:title>Artboard12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-1.png</image:loc><image:caption>CybereasonBlogTemplate41</image:caption><image:title>CybereasonBlogTemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(3).png</image:loc><image:caption>CybereasonBlogtemplate3</image:caption><image:title>CybereasonBlogtemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/this-was-a-targeted-attack-says-red-cross</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Jan-29-2022-03-00-52-61-PM.png</image:loc><image:caption>BankinfosecuritylogoJan29202203005261PM</image:caption><image:title>BankinfosecuritylogoJan29202203005261PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-names-it-security-visionary-sam-curry-chief-product-officer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Sam-Curry-1.png</image:loc><image:caption>SamCurry1</image:caption><image:title>SamCurry1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast.png</image:loc><image:caption>CISOStoriespodcast</image:caption><image:title>CISOStoriespodcast</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(5).png</image:loc><image:caption>CISOStoriespodcast5</image:caption><image:title>CISOStoriespodcast5</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/heres-what-25-channel-chiefs-see-as-the-biggest-challenges-solution-providers-face-in-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN%20logo-Mar-01-2022-10-49-22-83-PM.png</image:loc><image:caption>CRNlogoMar01202210492283PM</image:caption><image:title>CRNlogoMar01202210492283PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/resources/boost-your-defense-in-a-mobile-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Mobile-Threat-Defense-Webinar-04.18.24.png</image:loc><image:caption>MobileThreatDefenseWebinar041824</image:caption><image:title>MobileThreatDefenseWebinar041824</image:title></image:image><lastmod>2024-04-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sam-curry-discussses-the-shift-being-sought-from-indicators-of-behavior-to-indicators-of-compromise</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity-3.jpg</image:loc><image:caption>Bankinfosecurity3</image:caption><image:title>Bankinfosecurity3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomfree-is-the-free-program-that-protects-your-pc-against-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/PC-World2.png</image:loc><image:caption>PCWorld2</image:caption><image:title>PCWorld2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/recommended-reading-during-a-pandemic</loc><image:image><image:loc>https://www.cybereason.com/hubfs/how-to-think-like-a-roman-emperor.jpg</image:loc><image:caption>howtothinklikearomanemperor</image:caption><image:title>howtothinklikearomanemperor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/thinking-fast-and-slow.jpg</image:loc><image:caption>thinkingfastandslow</image:caption><image:title>thinkingfastandslow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/at-what-cost.jpg</image:loc><image:caption>atwhatcost</image:caption><image:title>atwhatcost</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/living-with-music.jpg</image:loc><image:caption>livingwithmusic</image:caption><image:title>livingwithmusic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/homegoing.jpg</image:loc><image:caption>homegoing</image:caption><image:title>homegoing</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blink-2.jpg</image:loc><image:caption>blink2</image:caption><image:title>blink2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Reading-List-Blog-Header-Image-B-sm.png</image:loc><image:caption>ReadingListBlogHeaderImageBsm</image:caption><image:title>ReadingListBlogHeaderImageBsm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1177-bc.jpg</image:loc><image:caption>1177bc</image:caption><image:title>1177bc</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ai-potential-cybersecurity-featured.png</image:loc><image:caption>aipotentialcybersecurityfeatured</image:caption><image:title>aipotentialcybersecurityfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Positioning_battle-for-your-mind.jpg</image:loc><image:caption>Positioningbattleforyourmind</image:caption><image:title>Positioningbattleforyourmind</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/secrets-of-timing.jpg</image:loc><image:caption>secretsoftiming</image:caption><image:title>secretsoftiming</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/universal-principles-of-design.jpg</image:loc><image:caption>universalprinciplesofdesign</image:caption><image:title>universalprinciplesofdesign</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/the-passion-paradox.jpg</image:loc><image:caption>thepassionparadox</image:caption><image:title>thepassionparadox</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-2.png</image:loc><image:caption>CybereasonBlogTemplate152</image:caption><image:title>CybereasonBlogTemplate152</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/blog/new-studies-paint-bleak-picture-of-future-soc-effectiveness</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Future%20SOC%20Effectiveness.png</image:loc><image:caption>FutureSOCEffectiveness</image:caption><image:title>FutureSOCEffectiveness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10XThreat.png</image:loc><image:caption>10XThreat</image:caption><image:title>10XThreat</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-02-23</lastmod></url><url><loc>https://www.cybereason.com/blog/how-click-fraud-commodity-malware-transforms-into-an-advanced-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Aerial_Road.jpg</image:loc><image:caption>AerialRoad</image:caption><image:title>AerialRoad</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/smartest-cybersecurity-minds-2024-blog-featured.png</image:loc><image:caption>smartestcybersecurityminds2024blogfeatured</image:caption><image:title>smartestcybersecurityminds2024blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2018-06-04</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-finalist-for-best-endpoint-security-product-in-2019-sc-awards-europe-competition</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-06-04</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/alastair-martin</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/wipro-blog-card-final.png</image:loc><image:caption>wiproblogcardfinal</image:caption><image:title>wiproblogcardfinal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/alastair-martin-hs.png</image:loc><image:caption>alastairmartinhs</image:caption><image:title>alastairmartinhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/one-year-after-wannacry-the-ransomware-threat-is-not-what-it-used-to-be</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-07-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/stealthy-attacks-multiply-and-victims-turn-to-spooks-as-a-service</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/it_world.jpg</image:loc><image:caption>itworld</image:caption><image:title>itworld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/careers/g-a</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Boston%20TechJam%202017.jpg</image:loc><image:caption>BostonTechJam2017</image:caption><image:title>BostonTechJam2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A1484-2.jpg</image:loc><image:caption>D0A14842</image:caption><image:title>D0A14842</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Josh%20Moody-1.png</image:loc><image:caption>UbUSpotlightJoshMoody1</image:caption><image:title>UbUSpotlightJoshMoody1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/play-btn.png</image:loc><image:caption>playbtn</image:caption><image:title>playbtn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/GnA-01.jpg</image:loc><image:caption>GnA01</image:caption><image:title>GnA01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A9760.jpg</image:loc><image:caption>D0A9760</image:caption><image:title>D0A9760</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blue_concrete.jpg</image:loc><image:caption>blueconcrete</image:caption><image:title>blueconcrete</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-builds-a-honeypot-masquerading-as-a-financial-services-company-and-traps-hackers-looking-to-steal-sensitive-information</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-04-20</lastmod></url><url><loc>https://www.cybereason.com/blog/breaking-down-the-hacking-team-attack-operation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(18).png</image:loc><image:caption>BLOGImagesTemplatev218</image:caption><image:title>BLOGImagesTemplatev218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Hacking-Team-Infection-Server-validation-script-1.jpg</image:loc><image:caption>HackingTeamInfectionServervalidationscript1</image:caption><image:title>HackingTeamInfectionServervalidationscript1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Team%20Attack%20Lab/security-concept-4-slim-1024x391.jpg</image:loc><image:caption>securityconcept4slim1024x391</image:caption><image:title>securityconcept4slim1024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Anonymizer-documentation-2-300x243-1.png</image:loc><image:caption>Anonymizerdocumentation2300x2431</image:caption><image:title>Anonymizerdocumentation2300x2431</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Team%20Attack%20Lab/privesc_py-flame-terminoligy.png</image:loc><image:caption>privescpyflameterminoligy</image:caption><image:title>privescpyflameterminoligy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/infectionscreenshot-e1436465682278-1.png</image:loc><image:caption>infectionscreenshote14364656822781</image:caption><image:title>infectionscreenshote14364656822781</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Team%20Attack%20Lab/Exploits-delivered-by-Hacking-Teams-servers_900X700.jpg</image:loc><image:caption>ExploitsdeliveredbyHackingTeamsservers900X700</image:caption><image:title>ExploitsdeliveredbyHackingTeamsservers900X700</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Hacking-Team-Expiration-email-1.png</image:loc><image:caption>HackingTeamExpirationemail1</image:caption><image:title>HackingTeamExpirationemail1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Hacking-Team-xp-filter-py-1.png</image:loc><image:caption>HackingTeamxpfilterpy1</image:caption><image:title>HackingTeamxpfilterpy1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Team%20Attack%20Lab/Hacking-Team-Windows-campaign-ID-list_small.png</image:loc><image:caption>HackingTeamWindowscampaignIDlistsmall</image:caption><image:title>HackingTeamWindowscampaignIDlistsmall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/0day-1.png</image:loc><image:caption>0day1</image:caption><image:title>0day1</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-ai-can-change-information-security-but-only-if-users-can-understand-the-technologys-benefits</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(5).png</image:loc><image:caption>ImagefromiOS5</image:caption><image:title>ImagefromiOS5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-26.jpg</image:loc><image:caption>Untitleddesign26</image:caption><image:title>Untitleddesign26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202025-01-17%20at%203.25.26%20PM.png</image:loc><image:caption>Screenshot20250117at32526PM</image:caption><image:title>Screenshot20250117at32526PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2017-12-15</lastmod></url><url><loc>https://www.cybereason.com/blog/mitre-attck-cybereason-dominates-the-competition</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-mitre-23-lp-featured-1.png</image:loc><image:caption>crmitre23lpfeatured1</image:caption><image:title>crmitre23lpfeatured1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mitre-graphic-updated.png</image:loc><image:caption>mitregraphicupdated</image:caption><image:title>mitregraphicupdated</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-cranford-author.png</image:loc><image:caption>jjcranfordauthor</image:caption><image:title>jjcranfordauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-01-05</lastmod></url><url><loc>https://www.cybereason.com/blog/using-analytics-to-develop-threat-intelligence-aids-companies-in-combating-apts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_221567437-1000x391.jpg</image:loc><image:caption>shutterstock2215674371000x391</image:caption><image:title>shutterstock2215674371000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/citrixbleed-featured-image.png</image:loc><image:caption>citrixbleedfeaturedimage</image:caption><image:title>citrixbleedfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-07-10</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-launches-ransomfree-japan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/how-to-generate-a-hypothesis-for-a-threat-hunt-techniques</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(119).png</image:loc><image:caption>blogposttext119</image:caption><image:title>blogposttext119</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(31).png</image:loc><image:caption>CybereasonBlogTemplate31</image:caption><image:title>CybereasonBlogTemplate31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Mor%20Levi.jpg</image:loc><image:caption>MorLevi</image:caption><image:title>MorLevi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><lastmod>2021-12-23</lastmod></url><url><loc>https://www.cybereason.com/resources/the-current-state-and-future-challenges-of-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/current-state-on-demand.png</image:loc><image:caption>currentstateondemand</image:caption><image:title>currentstateondemand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-05-07</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-stories-from-the-front-lines-of-security-leadershipjohn-knights-information-security-officer-at-wentworth-institute-of-technology</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/5%20steps%20to%20more%20effective%20ransomware%20response.png</image:loc><image:caption>5stepstomoreeffectiveransomwareresponse</image:caption><image:title>5stepstomoreeffectiveransomwareresponse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_619082513.jpg</image:loc><image:caption>shutterstock619082513</image:caption><image:title>shutterstock619082513</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malop.png</image:loc><image:caption>Malop</image:caption><image:title>Malop</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/mitre-2024-demonstrates-value-of-malop-technology</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE%20ATT&amp;CK%20Enterprise%20Evaluation%202024_Final.pptx.png</image:loc><image:caption>MITREATTCKEnterpriseEvaluation2024Finalpptx</image:caption><image:title>MITREATTCKEnterpriseEvaluation2024Finalpptx</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202025-01-17%20at%203.25.26%20PM.png</image:loc><image:caption>Screenshot20250117at32526PM</image:caption><image:title>Screenshot20250117at32526PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-mitre-23-lp-featured-1.png</image:loc><image:caption>crmitre23lpfeatured1</image:caption><image:title>crmitre23lpfeatured1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/former-u.s.-treasury-secretary-steven-mnuchins-firm-leads-275-million-investment-in-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC%20logo-Jul-15-2021-12-33-58-37-AM.png</image:loc><image:caption>CNBClogoJul15202112335837AM</image:caption><image:title>CNBClogoJul15202112335837AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-07-15</lastmod></url><url><loc>https://www.cybereason.com/blog/security-industry-innovator-art-coviello-joins-cybereason-board-of-directors</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-2.png</image:loc><image:caption>CybereasonBlogTemplate152</image:caption><image:title>CybereasonBlogTemplate152</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ai-potential-cybersecurity-featured.png</image:loc><image:caption>aipotentialcybersecurityfeatured</image:caption><image:title>aipotentialcybersecurityfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(15)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews151</image:caption><image:title>CopyofBLOGSOCIALSETNews151</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/jacob-berry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Building-a-SOC-Header-1.png</image:loc><image:caption>BuildingaSOCHeader1</image:caption><image:title>BuildingaSOCHeader1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CTF-Castle-Hero-1.png</image:loc><image:caption>CTFCastleHero1</image:caption><image:title>CTFCastleHero1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jacob-berry-hs.jpeg</image:loc><image:caption>jacobberryhs</image:caption><image:title>jacobberryhs</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/advanced-hackers-targeted-palestinian-officials-experts-say-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Breitebart%20logo.jpg</image:loc><image:caption>Breitebartlogo</image:caption><image:title>Breitebartlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-recognized-in-the-herd-100-top-emerging-privately-held-u.s.-technology-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(5).png</image:loc><image:caption>ImagefromiOS5</image:caption><image:title>ImagefromiOS5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-rsa-conference-2023.png</image:loc><image:caption>cybereasonrsaconference2023</image:caption><image:title>cybereasonrsaconference2023</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(120).png</image:loc><image:caption>blogposttext120</image:caption><image:title>blogposttext120</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/services/mdr-partners</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/deepwatch-1.png</image:loc><image:caption>deepwatch1</image:caption><image:title>deepwatch1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-ltgray-03.png</image:loc><image:caption>crbgsubtleltgray03</image:caption><image:title>crbgsubtleltgray03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cyderes-logo-transparent.png</image:loc><image:caption>cydereslogotransparent</image:caption><image:title>cydereslogotransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/ascend-technologies-logo-full-color.png</image:loc><image:caption>ascendtechnologieslogofullcolor</image:caption><image:title>ascendtechnologieslogofullcolor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/fortified-health-security-logo.jpg</image:loc><image:caption>fortifiedhealthsecuritylogo</image:caption><image:title>fortifiedhealthsecuritylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/armorpoint-logo-grayscale.png</image:loc><image:caption>armorpointlogograyscale</image:caption><image:title>armorpointlogograyscale</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-05-31</lastmod></url><url><loc>https://www.cybereason.com/blog/behavioral-execution-prevention-next-generation-antivirus-evolved</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Behavioral-Execution-Prevention.png</image:loc><image:caption>BehavioralExecutionPrevention</image:caption><image:title>BehavioralExecutionPrevention</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-2.jpg</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(8).png</image:loc><image:caption>blogposttext8</image:caption><image:title>blogposttext8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-05-25</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-fancy-bear-cozy-bear</loc><image:image><image:loc>https://www.cybereason.com/hubfs/21%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>21MALICIOUSLIFE1</image:caption><image:title>21MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cybereason-ciso-interview-series-security-from-the-inside-out</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-67.jpg</image:loc><image:caption>Untitleddesign67</image:caption><image:title>Untitleddesign67</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/ryan_gurney.jpg</image:loc><image:caption>ryangurney</image:caption><image:title>ryangurney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR_XDR.png</image:loc><image:caption>EDRXDR</image:caption><image:title>EDRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(21)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews211</image:caption><image:title>CopyofBLOGSOCIALSETNews211</image:title></image:image><lastmod>2018-01-10</lastmod></url><url><loc>https://www.cybereason.com/blog/the-advantage-of-combining-ngav-with-edr-to-protect-against-advanced-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_792177457.jpg</image:loc><image:caption>shutterstock792177457</image:caption><image:title>shutterstock792177457</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-19</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-fall-of-mt.-gox-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mt-gox-protest.jpeg</image:loc><image:caption>mtgoxprotest</image:caption><image:title>mtgoxprotest</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/40%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>40MALICIOUSLIFE</image:caption><image:title>40MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-cybereason-ransomware-study-reveals-true-cost-to-uae-businesses-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AMEinfo%20logo.png</image:loc><image:caption>AMEinfologo</image:caption><image:title>AMEinfologo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-caught-in-the-crossfire-infighting-and-treason-in-russias-cyber-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(21).png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(24).png</image:loc><image:caption>MaliciousLifeepisode24</image:caption><image:title>MaliciousLifeepisode24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-09-17</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-from-icedid-to-domain-compromise</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Derrick%20Masters.png</image:loc><image:caption>DerrickMasters</image:caption><image:title>DerrickMasters</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Process%20tree%20showing%20the%20interactive%20CMD%20session-1.png</image:loc><image:caption>CybereasonProcesstreeshowingtheinteractiveCMDsession1</image:caption><image:title>CybereasonProcesstreeshowingtheinteractiveCMDsession1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20process%20tree%20screenshot%20showing%20OS%20and%20Active%20Directory%20discovery%20activity-1.png</image:loc><image:caption>CybereasonprocesstreescreenshotshowingOSandActiveDirectorydiscoveryactivity1</image:caption><image:title>CybereasonprocesstreescreenshotshowingOSandActiveDirectorydiscoveryactivity1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Process%20tree%20showing%20executions%20of%20the%20Atera%20Agent.png</image:loc><image:caption>ProcesstreeshowingexecutionsoftheAteraAgent</image:caption><image:title>ProcesstreeshowingexecutionsoftheAteraAgent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chris%20Casey.png</image:loc><image:caption>ChrisCasey</image:caption><image:title>ChrisCasey</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Timeline.png</image:loc><image:caption>Timeline</image:caption><image:title>Timeline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cobalt%20Strike%20process%20loading%20Rubeus.png</image:loc><image:caption>CobaltStrikeprocessloadingRubeus</image:caption><image:title>CobaltStrikeprocessloadingRubeus</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Detection%20showing%20Active%20Directory%20abuse%2c%20identified%20by%20the%20DRSGetNCChanges%20MSRPC%20call.png</image:loc><image:caption>DetectionshowingActiveDirectoryabuseidentifiedbytheDRSGetNCChangesMSRPCcall</image:caption><image:title>DetectionshowingActiveDirectoryabuseidentifiedbytheDRSGetNCChangesMSRPCcall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Module%20init_dll_64.dll%20being%20loaded%20into%20memory-1.png</image:loc><image:caption>Moduleinitdll64dllbeingloadedintomemory1</image:caption><image:title>Moduleinitdll64dllbeingloadedintomemory1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IcedID%20Infection%20Flow.png</image:loc><image:caption>IcedIDInfectionFlow</image:caption><image:title>IcedIDInfectionFlow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Installation%20of%20the%20AteraAgent.png</image:loc><image:caption>InstallationoftheAteraAgent</image:caption><image:title>InstallationoftheAteraAgent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-Jan-06-2023-11-40-30-7591-PM.png</image:loc><image:caption>blogposttextJan0620231140307591PM</image:caption><image:title>blogposttextJan0620231140307591PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Netscan.exe%20used%20to%20locate%20additional%20hosts%20for%20lateral%20movement.png</image:loc><image:caption>Netscanexeusedtolocateadditionalhostsforlateralmovement</image:caption><image:title>Netscanexeusedtolocateadditionalhostsforlateralmovement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Rundll32.exe%20process%20executing%20the%20DLL%20file%20named%20homesteading.dll-1.png</image:loc><image:caption>Rundll32exeprocessexecutingtheDLLfilenamedhomesteadingdll1</image:caption><image:title>Rundll32exeprocessexecutingtheDLLfilenamedhomesteadingdll1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sliver%20C2-1.png</image:loc><image:caption>SliverC21</image:caption><image:title>SliverC21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Rundll32.exe%20loading%20xaeywn1.dll%20and%20referencing%20%E2%80%9Clicense.dat%E2%80%9D%20as%20an%20argument.png</image:loc><image:caption>Rundll32exeloadingxaeywn1dllandreferencinglicensedatasanargument</image:caption><image:title>Rundll32exeloadingxaeywn1dllandreferencinglicensedatasanargument</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Process%20hooking%20into%20Chrome.exe.png</image:loc><image:caption>ProcesshookingintoChromeexe</image:caption><image:title>ProcesshookingintoChromeexe</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Opening%20the%20zip%20archive%20containing%20an%20ISO%20file.png</image:loc><image:caption>OpeningtheziparchivecontaininganISOfile</image:caption><image:title>OpeningtheziparchivecontaininganISOfile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Nicholas%20Mangano.png</image:loc><image:caption>NicholasMangano</image:caption><image:title>NicholasMangano</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20process%20rundll32.exe%20is%20detected%20as%20it%20performed%20Kerberoasting%20attacks.png</image:loc><image:caption>Theprocessrundll32exeisdetectedasitperformedKerberoastingattacks</image:caption><image:title>Theprocessrundll32exeisdetectedasitperformedKerberoastingattacks</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LNK%20file%20showing%20that%20twelfth.bat%20will%20be%20executed%20when%20this%20is%20clicked-1.png</image:loc><image:caption>LNKfileshowingthattwelfthbatwillbeexecutedwhenthisisclicked1</image:caption><image:title>LNKfileshowingthattwelfthbatwillbeexecutedwhenthisisclicked1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Executions%20of%20renamed%20rclone.exe.png</image:loc><image:caption>Executionsofrenamedrcloneexe</image:caption><image:title>Executionsofrenamedrcloneexe</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Content%20of%20the%20folder%20%E2%80%9Chey%E2%80%9D%20shows%20a%20DLL%20file-1.png</image:loc><image:caption>ContentofthefolderheyshowsaDLLfile1</image:caption><image:title>ContentofthefolderheyshowsaDLLfile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cobalt%20Strike%20payload%20used%20after%20lateral%20movement.png</image:loc><image:caption>CobaltStrikepayloadusedafterlateralmovement</image:caption><image:title>CobaltStrikepayloadusedafterlateralmovement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Process%20tree%20showing%20regsvr32.exe%20loading%20a%20Cobalt%20Strike%20module%2c%20executing%20discovery%20action%20on%20the%20network%20and%20communicating%20with%20a%20C2%20domain-1.png</image:loc><image:caption>Processtreeshowingregsvr32exeloadingaCobaltStrikemoduleexecutingdiscoveryactiononthenetworkandcommunicatingwithaC2domain1</image:caption><image:title>Processtreeshowingregsvr32exeloadingaCobaltStrikemoduleexecutingdiscoveryactiononthenetworkandcommunicatingwithaC2domain1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Execution%20of%20the%20BAT%20file%20%E2%80%9Cdealing.bat%E2%80%9D.png</image:loc><image:caption>ExecutionoftheBATfiledealingbat</image:caption><image:title>ExecutionoftheBATfiledealingbat</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partially%20de-obfuscated%20BAT%20file%2c%20showing%20the%20copy%20of%20the%20DLL%20followed%20by%20the%20execution%20of%20rundll32.exe.png</image:loc><image:caption>PartiallydeobfuscatedBATfileshowingthecopyoftheDLLfollowedbytheexecutionofrundll32exe</image:caption><image:title>PartiallydeobfuscatedBATfileshowingthecopyoftheDLLfollowedbytheexecutionofrundll32exe</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSRPC%20call%20indicating%20the%20creation%20of%20a%20scheduled%20task-1.png</image:loc><image:caption>MSRPCcallindicatingthecreationofascheduledtask1</image:caption><image:title>MSRPCcallindicatingthecreationofascheduledtask1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Snippet%20of%20the%20obfuscated%20BAT%20file-1.png</image:loc><image:caption>SnippetoftheobfuscatedBATfile1</image:caption><image:title>SnippetoftheobfuscatedBATfile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Decoded%20PowerShell%20command-1.png</image:loc><image:caption>DecodedPowerShellcommand1</image:caption><image:title>DecodedPowerShellcommand1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Content%20of%20the%20ISO%20file%2c%20once%20mounted%20as%20a%20virtual%20drive.png</image:loc><image:caption>ContentoftheISOfileoncemountedasavirtualdrive</image:caption><image:title>ContentoftheISOfileoncemountedasavirtualdrive</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20process%20curl%20was%20used%20to%20download%20power.bat%20and%20powerDEF.dat-1.png</image:loc><image:caption>TheprocesscurlwasusedtodownloadpowerbatandpowerDEFdat1</image:caption><image:title>TheprocesscurlwasusedtodownloadpowerbatandpowerDEFdat1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Process%20tree%20showing%20rundll32.exe%20that%20unpacked%20the%20IcedID%2c%20spawned%20dllhost.exe-1.png</image:loc><image:caption>CybereasonProcesstreeshowingrundll32exethatunpackedtheIcedIDspawneddllhostexe1</image:caption><image:title>CybereasonProcesstreeshowingrundll32exethatunpackedtheIcedIDspawneddllhostexe1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Wmic.exe%20used%20for%20lateral%20movement.png</image:loc><image:caption>Wmicexeusedforlateralmovement</image:caption><image:title>Wmicexeusedforlateralmovement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Brandon%20Ledyard.png</image:loc><image:caption>BrandonLedyard</image:caption><image:title>BrandonLedyard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Loic%20Castel.png</image:loc><image:caption>LoicCastel</image:caption><image:title>LoicCastel</image:title></image:image><lastmod>2023-01-10</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-cybereason-xdr-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/xdr-platform-datasheet-cover.png</image:loc><image:caption>xdrplatformdatasheetcover</image:caption><image:title>xdrplatformdatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-03-08</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alert-bitbucket-malware-arsenal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/YELLOW_THREAT_ALERT_CR_ICONS-53.svg</image:loc><image:caption>YELLOWTHREATALERTCRICONS53</image:caption><image:title>YELLOWTHREATALERTCRICONS53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/blog/cuckoo-spear</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1).png</image:loc><image:caption>BLOGPOST1</image:caption><image:title>BLOGPOST1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-pt-2-featured.png</image:loc><image:caption>cuckoospearpt2featured</image:caption><image:title>cuckoospearpt2featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-part-1-analysis-blog-analysis-featured.png</image:loc><image:caption>cuckoospearpart1analysisbloganalysisfeatured</image:caption><image:title>cuckoospearpart1analysisbloganalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2024-08-01</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-spam-empire</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Stephen_Cobb.jpeg</image:loc><image:caption>StephenCobb</image:caption><image:title>StephenCobb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(10).png</image:loc><image:caption>MaliciousLifeepisode10</image:caption><image:title>MaliciousLifeepisode10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20(3).png</image:loc><image:caption>BLOG3</image:caption><image:title>BLOG3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(24).png</image:loc><image:caption>MaliciousLifeepisode24</image:caption><image:title>MaliciousLifeepisode24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-gozi-b-side-amit-serper-sam-curry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/61%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>61MALICIOUSLIFE</image:caption><image:title>61MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(26)-2.png</image:loc><image:caption>CybereasonBlogTemplate262</image:caption><image:title>CybereasonBlogTemplate262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gI_67392_Amit%20Serper%20Photo%202016.png</image:loc><image:caption>gI67392AmitSerperPhoto2016</image:caption><image:title>gI67392AmitSerperPhoto2016</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(3).png</image:loc><image:caption>MaliciousLifeTemplate3</image:caption><image:title>MaliciousLifeTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/consulting/ediscovery-services-document-review</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase__mobile-group-respondor.png</image:loc><image:caption>crowlshowcasemobilegrouprespondor</image:caption><image:title>crowlshowcasemobilegrouprespondor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PROTECT_ENTERPRISE_CR_ICONS-08.png</image:loc><image:caption>PROTECTENTERPRISECRICONS08</image:caption><image:title>PROTECTENTERPRISECRICONS08</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-detectia-in-flight--transparent-min.png</image:loc><image:caption>crdetectiainflighttransparentmin</image:caption><image:title>crdetectiainflighttransparentmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ben-demonte.jpg</image:loc><image:caption>bendemonte</image:caption><image:title>bendemonte</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-preventid-flipped.png</image:loc><image:caption>crowlshowcasepreventidflipped</image:caption><image:title>crowlshowcasepreventidflipped</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Consulting%20Team/cybereason%20relativity%20ediscovery%20certified.png</image:loc><image:caption>cybereasonrelativityediscoverycertified</image:caption><image:title>cybereasonrelativityediscoverycertified</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-spine-bg--posture-incident-management-d.jpg</image:loc><image:caption>crplatformspinebgpostureincidentmanagementd</image:caption><image:title>crplatformspinebgpostureincidentmanagementd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-protector-hero-with-hex-bg-v2.png</image:loc><image:caption>crprotectorherowithhexbgv2</image:caption><image:title>crprotectorherowithhexbgv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILITY_HUNTING_CR_ICONS-13.svg</image:loc><image:caption>VISIBILITYHUNTINGCRICONS13</image:caption><image:title>VISIBILITYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Mitre%20Blog%202026.png</image:loc><image:caption>CybereasonMitreBlog2026</image:caption><image:title>CybereasonMitreBlog2026</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dave-LI.jpg</image:loc><image:caption>DaveLI</image:caption><image:title>DaveLI</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR2_CR_ICONS-11.png</image:loc><image:caption>EDR2CRICONS11</image:caption><image:title>EDR2CRICONS11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/5.jpeg</image:loc><image:caption>5</image:caption><image:title>5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/CR-owl-featured-img-1200x630.jpg</image:loc><image:caption>CRowlfeaturedimg1200x630</image:caption><image:title>CRowlfeaturedimg1200x630</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(36).png</image:loc><image:caption>BLOGImagesTemplatev236</image:caption><image:title>BLOGImagesTemplatev236</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/REPORT_CR_ICONS-41.svg</image:loc><image:caption>REPORTCRICONS41</image:caption><image:title>REPORTCRICONS41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-nominated-as-finalist-info-securitys-2015-global-excellence-award</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T065715.064.png</image:loc><image:caption>blogposttext20221006T065715064</image:caption><image:title>blogposttext20221006T065715064</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><lastmod>2018-01-24</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-ciso-business-enablement-getting-to-yes</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(6).png</image:loc><image:caption>CISOStoriespodcast6</image:caption><image:title>CISOStoriespodcast6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template%20(9)-1.png</image:loc><image:caption>CISOStoriesTemplate91</image:caption><image:title>CISOStoriesTemplate91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Todd%20F.jpg</image:loc><image:caption>ToddF</image:caption><image:title>ToddF</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-poll-80-percent-of-victims-dont-pay-up</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ThreatPost%20logo-3.png</image:loc><image:caption>ThreatPostlogo3</image:caption><image:title>ThreatPostlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-named-to-forbes-2022-cloud-100</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes%20logo-Aug-17-2022-04-51-56-05-PM.png</image:loc><image:caption>ForbeslogoAug17202204515605PM</image:caption><image:title>ForbeslogoAug17202204515605PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-08-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-and-intel-partner-and-take-decisive-action-to-end-the-ransomware-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo-3.png</image:loc><image:caption>ZDNetlogo3</image:caption><image:title>ZDNetlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-01-11</lastmod></url><url><loc>https://www.cybereason.com/blog/bec-email-signature-technique</loc><image:image><image:loc>https://www.cybereason.com/hubfs/signature.png</image:loc><image:caption>signature</image:caption><image:title>signature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/activemq-blog-featured.png</image:loc><image:caption>activemqblogfeatured</image:caption><image:title>activemqblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/college%20IT%20admin-1.png</image:loc><image:caption>collegeITadmin1</image:caption><image:title>collegeITadmin1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(8).png</image:loc><image:caption>BLOGImagesTemplatev28</image:caption><image:title>BLOGImagesTemplatev28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat-Alert-GootLoader-SEO-Poisoning.png</image:loc><image:caption>ThreatAlertGootLoaderSEOPoisoning</image:caption><image:title>ThreatAlertGootLoaderSEOPoisoning</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/email.png</image:loc><image:caption>email</image:caption><image:title>email</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2025-02-25</lastmod></url><url><loc>https://www.cybereason.com/blog/digital-forensic-breadcrumbs-at-the-2020-grace-hopper-celebration</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/grace-hopper-celebration-2020-Dark.png</image:loc><image:caption>gracehoppercelebration2020Dark</image:caption><image:title>gracehoppercelebration2020Dark</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(121).png</image:loc><image:caption>blogposttext121</image:caption><image:title>blogposttext121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T074703.175.png</image:loc><image:caption>blogposttext20220627T074703175</image:caption><image:title>blogposttext20220627T074703175</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-scores-a-4.7-out-of-possible-5.0-rating-in-gartner-peer-insights-for-endpoint-detection-response-solutions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2018-03-20</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/meg-oleary</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/owls-group.png</image:loc><image:caption>owlsgroup</image:caption><image:title>owlsgroup</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gartner_mq_NO_CTA.jpg</image:loc><image:caption>gartnermqNOCTA</image:caption><image:title>gartnermqNOCTA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IWD%20blog%20Meg%20OLeary.png</image:loc><image:caption>IWDblogMegOLeary</image:caption><image:title>IWDblogMegOLeary</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/making-of-the-defenders-blog.png</image:loc><image:caption>makingofthedefendersblog</image:caption><image:title>makingofthedefendersblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/meg-oleary-square.jpg</image:loc><image:caption>megolearysquare</image:caption><image:title>megolearysquare</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(65).png</image:loc><image:caption>blogposttext65</image:caption><image:title>blogposttext65</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-is-a-promising-cybersecurity-company-even-in-a-down-economy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Business%20Insider%20logo-3.png</image:loc><image:caption>BusinessInsiderlogo3</image:caption><image:title>BusinessInsiderlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-criminals-target-covid19-vaccine</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Dec-07-2020-02-43-35-01-PM.png</image:loc><image:caption>InfosecurityMagazinelogoDec07202002433501PM</image:caption><image:title>InfosecurityMagazinelogoDec07202002433501PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-12-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-whatsapp-merger-with-facebook-messenger-puts-your-privacy-at-risk</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/forbes-logo-5.gif</image:loc><image:caption>forbeslogo5</image:caption><image:title>forbeslogo5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2019-01-30</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/orli-solomon</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Orli%20Solomon.png</image:loc><image:caption>OrliSolomon</image:caption><image:title>OrliSolomon</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-28T090319.905.png</image:loc><image:caption>blogposttext20220928T090319905</image:caption><image:title>blogposttext20220928T090319905</image:title></image:image><lastmod>2022-09-22</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-dark-avenger</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-1.png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/0_0_480_1_70__News_vesselin%20bontchev.jpg</image:loc><image:caption>00480170Newsvesselinbontchev</image:caption><image:title>00480170Newsvesselinbontchev</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-245-Card.png</image:loc><image:caption>MLEp245Card</image:caption><image:title>MLEp245Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20(2).png</image:loc><image:caption>BLOG2</image:caption><image:title>BLOG2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/press/half-of-us-citizens-have-never-heard-of-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-king-kimble-kim-dotcom</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(28).png</image:loc><image:caption>MaliciousLifeepisode28</image:caption><image:title>MaliciousLifeepisode28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-252-featured.png</image:loc><image:caption>MLEp252featured</image:caption><image:title>MLEp252featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(7).png</image:loc><image:caption>Maliciouslifepodcast7</image:caption><image:title>Maliciouslifepodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2023-03-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/improved-version-of-valak-malware-targets-enterprises-in-us-germany</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Week%20logo-1.png</image:loc><image:caption>SecurityWeeklogo1</image:caption><image:title>SecurityWeeklogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-05-29</lastmod></url><url><loc>https://www.cybereason.com/resources/solarwinds-supply-chain-attack-what-you-need-to-know</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/solarwinds-webinar-card-recording.png</image:loc><image:caption>solarwindswebinarcardrecording</image:caption><image:title>solarwindswebinarcardrecording</image:title></image:image><lastmod>2021-01-06</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-protects-against-malware-utilizing-the-exploit-cve-2017-8759</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-23.jpg</image:loc><image:caption>Untitleddesign23</image:caption><image:title>Untitleddesign23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(7).png</image:loc><image:caption>BLOGImagesTemplatev27</image:caption><image:title>BLOGImagesTemplatev27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2017-12-15</lastmod></url><url><loc>https://www.cybereason.com/press/nec-and-cybereason-sign-agreement-to-provide-advanced-cybersecurity-solutions-to-brazilian-market</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-12-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/working-from-home-security-risks-and-opportunity-in-a-challenging-time</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Arabian%20Reseller.png</image:loc><image:caption>ArabianReseller</image:caption><image:title>ArabianReseller</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-04-13</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-cybersecurity-collaborative-bring-senior-security-executives-together-on-top-ciso-priorities-for-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-03-09</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereasons-ransomfree-detects-and-prevents-notpeyta-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereasons-deep-hunting-tour-stops-in-50-cities-across-the-united-states</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2018-02-20</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-vs.-black-basta-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Jun-22-2022-07-16-09-83-PM.png</image:loc><image:caption>image14Jun22202207160983PM</image:caption><image:title>image14Jun22202207160983PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Jun-22-2022-07-18-58-38-PM.png</image:loc><image:caption>image13Jun22202207185838PM</image:caption><image:title>image13Jun22202207185838PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Jun-22-2022-07-18-30-87-PM.png</image:loc><image:caption>image2Jun22202207183087PM</image:caption><image:title>image2Jun22202207183087PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Jun-22-2022-07-20-33-05-PM.png</image:loc><image:caption>image15Jun22202207203305PM</image:caption><image:title>image15Jun22202207203305PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Jun-22-2022-07-24-57-63-PM.png</image:loc><image:caption>image8Jun22202207245763PM</image:caption><image:title>image8Jun22202207245763PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Jun-22-2022-07-21-48-46-PM.png</image:loc><image:caption>image3Jun22202207214846PM</image:caption><image:title>image3Jun22202207214846PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Jun-22-2022-07-17-23-73-PM.png</image:loc><image:caption>image7Jun22202207172373PM</image:caption><image:title>image7Jun22202207172373PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Jun-22-2022-07-16-40-69-PM.png</image:loc><image:caption>image11Jun22202207164069PM</image:caption><image:title>image11Jun22202207164069PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vs-ransomware.png</image:loc><image:caption>vsransomware</image:caption><image:title>vsransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Jun-22-2022-07-19-39-41-PM.png</image:loc><image:caption>image12Jun22202207193941PM</image:caption><image:title>image12Jun22202207193941PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Jun-22-2022-07-22-24-71-PM.png</image:loc><image:caption>image10Jun22202207222471PM</image:caption><image:title>image10Jun22202207222471PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Jun-22-2022-07-23-26-26-PM.png</image:loc><image:caption>image9Jun22202207232626PM</image:caption><image:title>image9Jun22202207232626PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Jun-22-2022-07-21-22-00-PM.png</image:loc><image:caption>image1Jun22202207212200PM</image:caption><image:title>image1Jun22202207212200PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Jun-22-2022-07-17-57-51-PM.png</image:loc><image:caption>image16Jun22202207175751PM</image:caption><image:title>image16Jun22202207175751PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Jun-22-2022-07-22-51-22-PM.png</image:loc><image:caption>image5Jun22202207225122PM</image:caption><image:title>image5Jun22202207225122PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Jun-22-2022-07-15-06-62-PM.png</image:loc><image:caption>image4Jun22202207150662PM</image:caption><image:title>image4Jun22202207150662PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><lastmod>2022-06-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-the-government-can-help-businesses-fight-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/network_world.jpg</image:loc><image:caption>networkworld</image:caption><image:title>networkworld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereasons-ngav-engine-integrated-into-virustotal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-operation-trojan-shield-designed-by-criminals-for-criminals</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(9).png</image:loc><image:caption>MaliciousLifeepisode9</image:caption><image:title>MaliciousLifeepisode9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(21).png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><lastmod>2022-08-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/dont-become-the-next-travelex-get-ready-for-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ComputerWeekly-2.png</image:loc><image:caption>ComputerWeekly2</image:caption><image:title>ComputerWeekly2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-01-14</lastmod></url><url><loc>https://www.cybereason.com/blog/case-study-a-global-aerospace-manufacturer-used-cybereason-to-automate-threat-hunting</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_382266112.jpg</image:loc><image:caption>shutterstock382266112</image:caption><image:title>shutterstock382266112</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/press/datacentrix-and-cybereason-change-the-security-game</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-11-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/to-automate-or-not-to-automate-incident-response-that-is-the-question</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/esg.jpg</image:loc><image:caption>esg</image:caption><image:title>esg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-phishing-campaign-targeting-us-tax-return-payers-ahead-of-2021-deadline-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRadar%20logo-1.png</image:loc><image:caption>TechRadarlogo1</image:caption><image:title>TechRadarlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-03-18</lastmod></url><url><loc>https://www.cybereason.com/blog/a-cisos-biggest-concern-better-alignment-between-security-and-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled%20design%20(84).jpg</image:loc><image:caption>Untitleddesign84</image:caption><image:title>Untitleddesign84</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(9).png</image:loc><image:caption>CISOStoriestemplate9</image:caption><image:title>CISOStoriestemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2017-11-21</lastmod></url><url><loc>https://www.cybereason.com/blog/iran-strikes-us-with-cyberattack-over-nuclear-deal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_273465104.jpg</image:loc><image:caption>shutterstock273465104</image:caption><image:title>shutterstock273465104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MATAN.jpeg</image:loc><image:caption>MATAN</image:caption><image:title>MATAN</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-01-26</lastmod></url><url><loc>https://www.cybereason.com/resources/new-generation-machine-based-attacks/webinar/us/071123</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/chatGPT-Banner-July-11-2023.png</image:loc><image:caption>chatGPTBannerJuly112023</image:caption><image:title>chatGPTBannerJuly112023</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-11-07</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-gozi-part-1-the-rise-of-malware-as-a-service</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/58%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>58MALICIOUSLIFE</image:caption><image:title>58MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-wild-west-hackin-fest</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/138%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>138MALICIOUSLIFE</image:caption><image:title>138MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/John%20Strand.jpg</image:loc><image:caption>JohnStrand</image:caption><image:title>JohnStrand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2021-11-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/deloitte-a-source-of-cyber-security-advice-hacked-emails-accessed</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/contis-allegiance-to-russia-could-help-the-ransomware-gang-avoid-capture</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tech%20Monitor%20logo.png</image:loc><image:caption>TechMonitorlogo</image:caption><image:title>TechMonitorlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/blog/research/the-sodinokibi-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-24.png</image:loc><image:caption>Sodinokibiblogimage24</image:caption><image:title>Sodinokibiblogimage24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-23.png</image:loc><image:caption>Sodinokibiblogimage23</image:caption><image:title>Sodinokibiblogimage23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-30.png</image:loc><image:caption>Sodinokibiblogimage30</image:caption><image:title>Sodinokibiblogimage30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-12.png</image:loc><image:caption>Sodinokibiblogimage12</image:caption><image:title>Sodinokibiblogimage12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-16.png</image:loc><image:caption>Sodinokibiblogimage16</image:caption><image:title>Sodinokibiblogimage16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-2.png</image:loc><image:caption>Sodinokibiblogimage2</image:caption><image:title>Sodinokibiblogimage2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-28.png</image:loc><image:caption>Sodinokibiblogimage28</image:caption><image:title>Sodinokibiblogimage28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-20.png</image:loc><image:caption>Sodinokibiblogimage20</image:caption><image:title>Sodinokibiblogimage20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-29.png</image:loc><image:caption>Sodinokibiblogimage29</image:caption><image:title>Sodinokibiblogimage29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-4.png</image:loc><image:caption>Sodinokibiblogimage4</image:caption><image:title>Sodinokibiblogimage4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-13.png</image:loc><image:caption>Sodinokibiblogimage13</image:caption><image:title>Sodinokibiblogimage13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-22.png</image:loc><image:caption>Sodinokibiblogimage22</image:caption><image:title>Sodinokibiblogimage22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-26.png</image:loc><image:caption>Sodinokibiblogimage26</image:caption><image:title>Sodinokibiblogimage26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-11.png</image:loc><image:caption>Sodinokibiblogimage11</image:caption><image:title>Sodinokibiblogimage11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-31.png</image:loc><image:caption>Sodinokibiblogimage31</image:caption><image:title>Sodinokibiblogimage31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-15.png</image:loc><image:caption>Sodinokibiblogimage15</image:caption><image:title>Sodinokibiblogimage15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-14.png</image:loc><image:caption>Sodinokibiblogimage14</image:caption><image:title>Sodinokibiblogimage14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-27.png</image:loc><image:caption>Sodinokibiblogimage27</image:caption><image:title>Sodinokibiblogimage27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-17.png</image:loc><image:caption>Sodinokibiblogimage17</image:caption><image:title>Sodinokibiblogimage17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-19.png</image:loc><image:caption>Sodinokibiblogimage19</image:caption><image:title>Sodinokibiblogimage19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-25.png</image:loc><image:caption>Sodinokibiblogimage25</image:caption><image:title>Sodinokibiblogimage25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-1.png</image:loc><image:caption>Sodinokibiblogimage1</image:caption><image:title>Sodinokibiblogimage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-7.png</image:loc><image:caption>Sodinokibiblogimage7</image:caption><image:title>Sodinokibiblogimage7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-10.png</image:loc><image:caption>Sodinokibiblogimage10</image:caption><image:title>Sodinokibiblogimage10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-18.png</image:loc><image:caption>Sodinokibiblogimage18</image:caption><image:title>Sodinokibiblogimage18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-21.png</image:loc><image:caption>Sodinokibiblogimage21</image:caption><image:title>Sodinokibiblogimage21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-8.png</image:loc><image:caption>Sodinokibiblogimage8</image:caption><image:title>Sodinokibiblogimage8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-5.png</image:loc><image:caption>Sodinokibiblogimage5</image:caption><image:title>Sodinokibiblogimage5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-6.png</image:loc><image:caption>Sodinokibiblogimage6</image:caption><image:title>Sodinokibiblogimage6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-3.png</image:loc><image:caption>Sodinokibiblogimage3</image:caption><image:title>Sodinokibiblogimage3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Sodinokibi-blog-image-9.png</image:loc><image:caption>Sodinokibiblogimage9</image:caption><image:title>Sodinokibiblogimage9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sodinokibi-blog-1.png</image:loc><image:caption>Sodinokibiblog1</image:caption><image:title>Sodinokibiblog1</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/resources/cutting-through-the-epp-noise-a-future-proof-strategy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-1038383026.jpg</image:loc><image:caption>GettyImages1038383026</image:caption><image:title>GettyImages1038383026</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2019-11-06</lastmod></url><url><loc>https://www.cybereason.com/blog/adobe-flash-player-zero-day</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_189107936-1.jpg</image:loc><image:caption>shutterstock1891079361</image:caption><image:title>shutterstock1891079361</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/microsofts-crazy-huge-hack-explained</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Gizmodo%20logo.png</image:loc><image:caption>Gizmodologo</image:caption><image:title>Gizmodologo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-03-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-announces-acquisition</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Jul-22-2021-01-23-22-31-AM.png</image:loc><image:caption>BankinfosecuritylogoJul22202101232231AM</image:caption><image:title>BankinfosecuritylogoJul22202101232231AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-07-22</lastmod></url><url><loc>https://www.cybereason.com/blog/how-cybereason-detects-apts-in-real-time</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_162674147-1000x391.jpg</image:loc><image:caption>shutterstock1626741471000x391</image:caption><image:title>shutterstock1626741471000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews11</image:caption><image:title>CopyofBLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/art-coviello-on-market-trends-emerging-tech-cybereason-an-xdr-leader</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-Jun-10-2022-02-21-13-30-AM.png</image:loc><image:caption>DatabreachtodaylogoJun10202202211330AM</image:caption><image:title>DatabreachtodaylogoJun10202202211330AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-life-and-times-of-john-mcafee</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/125%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>125MALICIOUSLIFE</image:caption><image:title>125MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-dave-kennedy-the-psychological-principles-of-social-engineering</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/download%20(1).jpeg</image:loc><image:caption>download1</image:caption><image:title>download1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/39%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>39MALICIOUSLIFE</image:caption><image:title>39MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(31).png</image:loc><image:caption>MaliciousLifeepisode31</image:caption><image:title>MaliciousLifeepisode31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-python-scripted-trojan-malware-targets-fintech-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo-1.png</image:loc><image:caption>ZDNetlogo1</image:caption><image:title>ZDNetlogo1</image:title></image:image><lastmod>2020-09-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/12-hot-cybersecurity-startups-with-lots-of-potential-to-watch</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Business%20Insider%20logo-5.png</image:loc><image:caption>BusinessInsiderlogo5</image:caption><image:title>BusinessInsiderlogo5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-06-12</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-trojan-horse-affair</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-239-Card.png</image:loc><image:caption>MLEp239Card</image:caption><image:title>MLEp239Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/17%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>17MALICIOUSLIFE1</image:caption><image:title>17MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-shutting-down-the-internet-in-30-min</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/106%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>106MALICIOUSLIFE</image:caption><image:title>106MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/132%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>132MALICIOUSLIFE1</image:caption><image:title>132MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(8).png</image:loc><image:caption>MaliciousLifeepisode8</image:caption><image:title>MaliciousLifeepisode8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/chris%20wysopal.png</image:loc><image:caption>chriswysopal</image:caption><image:title>chriswysopal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/meet-eventbot-a-new-android-malware-that-steals-banking-passwords-and-two-factor-codes</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechCrunch.png</image:loc><image:caption>TechCrunch</image:caption><image:title>TechCrunch</image:title></image:image><lastmod>2020-04-30</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-fiscally-responsible-ways-to-train-and-build-community</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7).png</image:loc><image:caption>CISOStoriestemplate7</image:caption><image:title>CISOStoriestemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Kevin%20Novack.png</image:loc><image:caption>KevinNovack</image:caption><image:title>KevinNovack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/blog/fileless-malware-powershell</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powershell-cr-blog.jpg</image:loc><image:caption>powershellcrblog</image:caption><image:title>powershellcrblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(125).png</image:loc><image:caption>blogposttext125</image:caption><image:title>blogposttext125</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(17).png</image:loc><image:caption>BLOGImagesTemplatev217</image:caption><image:title>BLOGImagesTemplatev217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><lastmod>2021-11-10</lastmod></url><url><loc>https://www.cybereason.com/rsac-2023</loc><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/square%20headshots/Aoibh_Wood-min.png</image:loc><image:caption>AoibhWoodmin</image:caption><image:title>AoibhWoodmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/Eran_Ilan.png</image:loc><image:caption>EranIlan</image:caption><image:title>EranIlan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--secondary-reversed.png</image:loc><image:caption>crlogoinlinesecondaryreversed</image:caption><image:title>crlogoinlinesecondaryreversed</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/Greg_Day.png</image:loc><image:caption>GregDay</image:caption><image:title>GregDay</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/owl-theater.png</image:loc><image:caption>owltheater</image:caption><image:title>owltheater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/iconsand.png</image:loc><image:caption>iconsand</image:caption><image:title>iconsand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/rsac_figurine-1.png</image:loc><image:caption>rsacfigurine1</image:caption><image:title>rsacfigurine1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/images/headshots/Israel_Barak.png</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RSAC_Background.png</image:loc><image:caption>RSACBackground</image:caption><image:title>RSACBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WebLego.png</image:loc><image:caption>WebLego</image:caption><image:title>WebLego</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-03-22</lastmod></url><url><loc>https://www.cybereason.com/blog/why-we-created-remote-workforce-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Remote-Work-Laptop-Banner.png</image:loc><image:caption>RemoteWorkLaptopBanner</image:caption><image:title>RemoteWorkLaptopBanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2020-03-25</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-alert-malicious-code-implant-in-the-uaparser.js-library</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-1.jpg</image:loc><image:caption>image51</image:caption><image:title>image51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Oct-27-2021-05-10-24-94-PM.png</image:loc><image:caption>image2Oct27202105102494PM</image:caption><image:title>image2Oct27202105102494PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(2).png</image:loc><image:caption>ImagefromiOS2</image:caption><image:title>ImagefromiOS2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1.jpg</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-1.jpg</image:loc><image:caption>image31</image:caption><image:title>image31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-1.jpg</image:loc><image:caption>image61</image:caption><image:title>image61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Oct-27-2021-05-08-17-35-PM.png</image:loc><image:caption>image4Oct27202105081735PM</image:caption><image:title>image4Oct27202105081735PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7.jpg</image:loc><image:caption>image7</image:caption><image:title>image7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-04-11</lastmod></url><url><loc>https://www.cybereason.com/platform/private-infrastructure-protection</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-private-infrastructure-protection--thumb.jpg</image:loc><image:caption>crprivateinfrastructureprotectionthumb</image:caption><image:title>crprivateinfrastructureprotectionthumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-wing.png</image:loc><image:caption>crbgherobluesubtlewithwing</image:caption><image:title>crbgherobluesubtlewithwing</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-hero-bg-private-infrastructure-deployment.jpg</image:loc><image:caption>crherobgprivateinfrastructuredeployment</image:caption><image:title>crherobgprivateinfrastructuredeployment</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-white--lightened.jpg</image:loc><image:caption>crbgsubtlewhitelightened</image:caption><image:title>crbgsubtlewhitelightened</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/DEPLOY_CR_ICONS-07.png</image:loc><image:caption>DEPLOYCRICONS07</image:caption><image:title>DEPLOYCRICONS07</image:title></image:image><lastmod>2023-03-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-raises-200-million-for-its-enterprise-security-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechCrunch%20logo-2.png</image:loc><image:caption>TechCrunchlogo2</image:caption><image:title>TechCrunchlogo2</image:title></image:image><lastmod>2019-08-06</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-report-dll-side-loading-widely-abused</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-31.png</image:loc><image:caption>DLLSideLoading31</image:caption><image:title>DLLSideLoading31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-14.png</image:loc><image:caption>DLLSideLoading14</image:caption><image:title>DLLSideLoading14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-derrick.jpg</image:loc><image:caption>DLLSideLoadingderrick</image:caption><image:title>DLLSideLoadingderrick</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-23.png</image:loc><image:caption>DLLSideLoading23</image:caption><image:title>DLLSideLoading23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-29.png</image:loc><image:caption>DLLSideLoading29</image:caption><image:title>DLLSideLoading29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-6.png</image:loc><image:caption>DLLSideLoading6</image:caption><image:title>DLLSideLoading6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-1.png</image:loc><image:caption>DLLSideLoading1</image:caption><image:title>DLLSideLoading1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-19.png</image:loc><image:caption>DLLSideLoading19</image:caption><image:title>DLLSideLoading19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-28.png</image:loc><image:caption>DLLSideLoading28</image:caption><image:title>DLLSideLoading28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-26.png</image:loc><image:caption>DLLSideLoading26</image:caption><image:title>DLLSideLoading26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-12.png</image:loc><image:caption>DLLSideLoading12</image:caption><image:title>DLLSideLoading12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-25.png</image:loc><image:caption>DLLSideLoading25</image:caption><image:title>DLLSideLoading25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-8.png</image:loc><image:caption>DLLSideLoading8</image:caption><image:title>DLLSideLoading8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-11.png</image:loc><image:caption>DLLSideLoading11</image:caption><image:title>DLLSideLoading11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-20.png</image:loc><image:caption>DLLSideLoading20</image:caption><image:title>DLLSideLoading20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-9.png</image:loc><image:caption>DLLSideLoading9</image:caption><image:title>DLLSideLoading9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-3.png</image:loc><image:caption>DLLSideLoading3</image:caption><image:title>DLLSideLoading3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-5.png</image:loc><image:caption>DLLSideLoading5</image:caption><image:title>DLLSideLoading5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-15.png</image:loc><image:caption>DLLSideLoading15</image:caption><image:title>DLLSideLoading15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-21.png</image:loc><image:caption>DLLSideLoading21</image:caption><image:title>DLLSideLoading21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-27.png</image:loc><image:caption>DLLSideLoading27</image:caption><image:title>DLLSideLoading27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-32.png</image:loc><image:caption>DLLSideLoading32</image:caption><image:title>DLLSideLoading32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-17.png</image:loc><image:caption>DLLSideLoading17</image:caption><image:title>DLLSideLoading17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-22.png</image:loc><image:caption>DLLSideLoading22</image:caption><image:title>DLLSideLoading22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSI%20Masquerading%20as%20a%20Malicious%20Software%20Installer%20blog.png</image:loc><image:caption>MSIMasqueradingasaMaliciousSoftwareInstallerblog</image:caption><image:title>MSIMasqueradingasaMaliciousSoftwareInstallerblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-10.png</image:loc><image:caption>DLLSideLoading10</image:caption><image:title>DLLSideLoading10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-24.png</image:loc><image:caption>DLLSideLoading24</image:caption><image:title>DLLSideLoading24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-4.png</image:loc><image:caption>DLLSideLoading4</image:caption><image:title>DLLSideLoading4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-18.png</image:loc><image:caption>DLLSideLoading18</image:caption><image:title>DLLSideLoading18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-loic.jpg</image:loc><image:caption>DLLSideLoadingloic</image:caption><image:title>DLLSideLoadingloic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(84).png</image:loc><image:caption>blogposttext84</image:caption><image:title>blogposttext84</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-chen.png</image:loc><image:caption>DLLSideLoadingchen</image:caption><image:title>DLLSideLoadingchen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-30.png</image:loc><image:caption>DLLSideLoading30</image:caption><image:title>DLLSideLoading30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-7.png</image:loc><image:caption>DLLSideLoading7</image:caption><image:title>DLLSideLoading7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-2.png</image:loc><image:caption>DLLSideLoading2</image:caption><image:title>DLLSideLoading2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-16.png</image:loc><image:caption>DLLSideLoading16</image:caption><image:title>DLLSideLoading16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2024-08-12</lastmod></url><url><loc>https://www.cybereason.com/blog/nhs-warns-of-new-covid-19-vaccine-related-phishing-campaigns</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/covid-phishing-blog-2.png</image:loc><image:caption>covidphishingblog2</image:caption><image:title>covidphishingblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20to%20Not%20Build%20a%20Cybersecurity%20Startup-1.png</image:loc><image:caption>HowtoNotBuildaCybersecurityStartup1</image:caption><image:title>HowtoNotBuildaCybersecurityStartup1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/covid-phishing-blog-1.png</image:loc><image:caption>covidphishingblog1</image:caption><image:title>covidphishingblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/134%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>134MALICIOUSLIFE1</image:caption><image:title>134MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/covid-vaccine-blog-card.png</image:loc><image:caption>covidvaccineblogcard</image:caption><image:title>covidvaccineblogcard</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/blog/non-invasive-user-space-endpoint-security-the-best-of-both-worlds</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T083517.794.png</image:loc><image:caption>blogposttext20220907T083517794</image:caption><image:title>blogposttext20220907T083517794</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-3.png</image:loc><image:caption>CybereasonBlogTemplate53</image:caption><image:title>CybereasonBlogTemplate53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uber-hid-massive-hack-compromising-data-of-57m-for-a-year</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/scbetalogo1080860_1083188.png</image:loc><image:caption>scbetalogo10808601083188</image:caption><image:title>scbetalogo10808601083188</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/resources/hospitality-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/hospitality-case-study-featured.png</image:loc><image:caption>hospitalitycasestudyfeatured</image:caption><image:title>hospitalitycasestudyfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2022-03-29</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-examines-russian-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-future-proofing-security-programs-in-2021-and-beyond</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/future-proofing-webinar.png</image:loc><image:caption>futureproofingwebinar</image:caption><image:title>futureproofingwebinar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(16).png</image:loc><image:caption>CybereasonBlogTemplate16</image:caption><image:title>CybereasonBlogTemplate16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Josey%20grey%20(1).webp</image:loc><image:caption>Joseygrey1</image:caption><image:title>Joseygrey1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Berino%20New%20(1).webp</image:loc><image:caption>BerinoNew1</image:caption><image:title>BerinoNew1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry.webp</image:loc><image:caption>SamCurry</image:caption><image:title>SamCurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.cybereason.com/resources/cpsb-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cpsb-case-study-cover.png</image:loc><image:caption>cpsbcasestudycover</image:caption><image:title>cpsbcasestudycover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-11-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-cyber-bill-of-rights</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-we-can-learn-from-marriotts-new-data-breach-embarrassment</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ComputerWeekly-4.png</image:loc><image:caption>ComputerWeekly4</image:caption><image:title>ComputerWeekly4</image:title></image:image><lastmod>2020-04-13</lastmod></url><url><loc>https://www.cybereason.com/resources/idc-tech-spotlight</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IDC-Tech-Spotlight-Banner.png</image:loc><image:caption>IDCTechSpotlightBanner</image:caption><image:title>IDCTechSpotlightBanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-08-04</lastmod></url><url><loc>https://www.cybereason.com/blog/cve-2024-55956-cleo-vulnerability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(1).png</image:loc><image:caption>BLOGImagesTemplatev21</image:caption><image:title>BLOGImagesTemplatev21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(24).png</image:loc><image:caption>BLOGImagesTemplatev224</image:caption><image:title>BLOGImagesTemplatev224</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/clop.png</image:loc><image:caption>clop</image:caption><image:title>clop</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_SonicWall.png</image:loc><image:caption>BLOGImagesSonicWall</image:caption><image:title>BLOGImagesSonicWall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2024-12-17</lastmod></url><url><loc>https://www.cybereason.com/blog/arm-iot-security-chips-endpoints-artificial-intelligence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-861190024.jpg</image:loc><image:caption>GettyImages861190024</image:caption><image:title>GettyImages861190024</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/yossi-hs.png</image:loc><image:caption>yossihs</image:caption><image:title>yossihs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FIN7_BadUSB.png</image:loc><image:caption>FIN7BadUSB</image:caption><image:title>FIN7BadUSB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2018-10-17</lastmod></url><url><loc>https://www.cybereason.com/blog/visualization-a-security-must</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/blog-post_header.png</image:loc><image:caption>blogpostheader</image:caption><image:title>blogpostheader</image:title></image:image><lastmod>2018-01-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-detection-and-response-platform-product-overview</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SearchSecurity_001.png</image:loc><image:caption>SearchSecurity001</image:caption><image:title>SearchSecurity001</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-selected-as-finalist-for-mit-sloan-cio-symposiums-innovation-showcase</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/digital_journal.jpg</image:loc><image:caption>digitaljournal</image:caption><image:title>digitaljournal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-brings-valuable-perspective-to-cybersecurity-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes%20logo-2.png</image:loc><image:caption>Forbeslogo2</image:caption><image:title>Forbeslogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/online-holiday-shopping-can-expose-shoppers-retailers-and-employers-to-cyber-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cisco-firewalls-routers-and-switches-compromised-by-thrangrycat-just-dont-call-it-a-backdoor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-10.png</image:loc><image:caption>SCMagazine10</image:caption><image:title>SCMagazine10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sour-notes-ourmine-hackers-briefly-post-private-files-from-vevo-music-video-service</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-names-starlink-as-preferred-value-added-distributor-for-middle-east-and-turkey</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-06-06</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-vs.-ai-the-battle-between-machines</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(72).png</image:loc><image:caption>blogposttext72</image:caption><image:title>blogposttext72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-02T094421.274.png</image:loc><image:caption>blogposttext20220602T094421274</image:caption><image:title>blogposttext20220602T094421274</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-13T051646.778.png</image:loc><image:caption>blogposttext20220713T051646778</image:caption><image:title>blogposttext20220713T051646778</image:title></image:image><lastmod>2022-04-05</lastmod></url><url><loc>https://www.cybereason.com/resources/the-new-ursnif-variant</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Divide_1920x1080.jpg</image:loc><image:caption>Divide1920x1080</image:caption><image:title>Divide1920x1080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-04-25</lastmod></url><url><loc>https://www.cybereason.com/blog/report-ransomware-attacks-and-the-true-cost-to-business-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware%20Which%20Industries%20Are%20Most%20Likely%20to%20Pay-1.png</image:loc><image:caption>RansomwareWhichIndustriesAreMostLikelytoPay1</image:caption><image:title>RansomwareWhichIndustriesAreMostLikelytoPay1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(114).png</image:loc><image:caption>blogposttext114</image:caption><image:title>blogposttext114</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cap.png</image:loc><image:caption>Cap</image:caption><image:title>Cap</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-06T123240.080.png</image:loc><image:caption>blogposttext20220706T123240080</image:caption><image:title>blogposttext20220706T123240080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><lastmod>2022-06-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/colonial-pipeline-starts-recovery-from-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Govinfosecurity.com%20logo-2.jpg</image:loc><image:caption>Govinfosecuritycomlogo2</image:caption><image:title>Govinfosecuritycomlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-05-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-a-reason-to-watch-and-learn-from-real-time-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/zdnet-logo-large.png</image:loc><image:caption>zdnetlogolarge</image:caption><image:title>zdnetlogolarge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/automated-bots-growing-tools-for-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ThreatPost-Logo.png</image:loc><image:caption>ThreatPostLogo</image:caption><image:title>ThreatPostLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2018-04-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ukraine-says-russia-tried-to-hack-its-critical-infrastructure-again</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vice%20logo.jpg</image:loc><image:caption>Vicelogo</image:caption><image:title>Vicelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyberspies-linked-to-memento-ransomware-use-new-powershell-malware-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bleeping%20Computer%20logo-Feb-10-2022-03-36-13-35-PM.png</image:loc><image:caption>BleepingComputerlogoFeb10202203361335PM</image:caption><image:title>BleepingComputerlogoFeb10202203361335PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-acquires-empow-enhancing-its-xdr-offerings</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Calcalist%20logo-2.png</image:loc><image:caption>Calcalistlogo2</image:caption><image:title>Calcalistlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-22</lastmod></url><url><loc>https://www.cybereason.com/blog/research/amazon-gift-card-offer-serves-up-dridex-banking-trojan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-14.png</image:loc><image:caption>DridexBlog14</image:caption><image:title>DridexBlog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-4.png</image:loc><image:caption>DridexBlog4</image:caption><image:title>DridexBlog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-19.png</image:loc><image:caption>DridexBlog19</image:caption><image:title>DridexBlog19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-20.png</image:loc><image:caption>DridexBlog20</image:caption><image:title>DridexBlog20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-5.png</image:loc><image:caption>DridexBlog5</image:caption><image:title>DridexBlog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-8.png</image:loc><image:caption>DridexBlog8</image:caption><image:title>DridexBlog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-18.png</image:loc><image:caption>DridexBlog18</image:caption><image:title>DridexBlog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-9.png</image:loc><image:caption>DridexBlog9</image:caption><image:title>DridexBlog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-15.png</image:loc><image:caption>DridexBlog15</image:caption><image:title>DridexBlog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-1.png</image:loc><image:caption>DridexBlog1</image:caption><image:title>DridexBlog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-11.png</image:loc><image:caption>DridexBlog11</image:caption><image:title>DridexBlog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/amazon-gift-card-blog-card.png</image:loc><image:caption>amazongiftcardblogcard</image:caption><image:title>amazongiftcardblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-17.png</image:loc><image:caption>DridexBlog17</image:caption><image:title>DridexBlog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-3.png</image:loc><image:caption>DridexBlog3</image:caption><image:title>DridexBlog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-2.png</image:loc><image:caption>DridexBlog2</image:caption><image:title>DridexBlog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-7.png</image:loc><image:caption>DridexBlog7</image:caption><image:title>DridexBlog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-16.png</image:loc><image:caption>DridexBlog16</image:caption><image:title>DridexBlog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-22.png</image:loc><image:caption>DridexBlog22</image:caption><image:title>DridexBlog22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-6.png</image:loc><image:caption>DridexBlog6</image:caption><image:title>DridexBlog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-12.png</image:loc><image:caption>DridexBlog12</image:caption><image:title>DridexBlog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-21.png</image:loc><image:caption>DridexBlog21</image:caption><image:title>DridexBlog21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-13.png</image:loc><image:caption>DridexBlog13</image:caption><image:title>DridexBlog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Dridex-Blog-10.png</image:loc><image:caption>DridexBlog10</image:caption><image:title>DridexBlog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-to-design-your-cybersecurity-portfolio-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-uncovers-alarming-vulnerabilities-in-iot-devices</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CRN-Logo-800x392.png</image:loc><image:caption>CRNLogo800x392</image:caption><image:title>CRNLogo800x392</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/heres-the-hacking-group-responsible-for-the-colonial-pipeline-shutdown</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC%20logo-3.png</image:loc><image:caption>CNBClogo3</image:caption><image:title>CNBClogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-05-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-cyberdefenses-to-protect-your-smart-appliances-from-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/wall-street-journal-logo-1.png</image:loc><image:caption>wallstreetjournallogo1</image:caption><image:title>wallstreetjournallogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-11-09</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cybereason-ciso-interview-series-the-end-of-the-ciso</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(8).png</image:loc><image:caption>CISOStoriespodcast8</image:caption><image:title>CISOStoriespodcast8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Jonathan-Sinclair1.jpg</image:loc><image:caption>JonathanSinclair1</image:caption><image:title>JonathanSinclair1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-47.jpg</image:loc><image:caption>Untitleddesign47</image:caption><image:title>Untitleddesign47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereasons-new-unified-malop-dashboard</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(9)-1.png</image:loc><image:caption>CybereasonBlogTemplate91</image:caption><image:title>CybereasonBlogTemplate91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/soc-dash-23-ram-featured-image.png</image:loc><image:caption>socdash23ramfeaturedimage</image:caption><image:title>socdash23ramfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-soc-dash-4.png</image:loc><image:caption>crsocdash4</image:caption><image:title>crsocdash4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/ram-hs.jpg</image:loc><image:caption>ramhs</image:caption><image:title>ramhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2023-07-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-outlook-mailserver-attack-steals-massive-number-of-passwords</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/arstechnica_thumb-1-1.png</image:loc><image:caption>arstechnicathumb11</image:caption><image:title>arstechnicathumb11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/why-the-wannacry-coverage-may-have-missed-the-mark</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Eliad%20Kimhy.jpg</image:loc><image:caption>EliadKimhy</image:caption><image:title>EliadKimhy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/hospital-ransomware1.png</image:loc><image:caption>hospitalransomware1</image:caption><image:title>hospitalransomware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(89).png</image:loc><image:caption>blogposttext89</image:caption><image:title>blogposttext89</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-defense-three-implementations-every-security-team-needs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94).png</image:loc><image:caption>blogposttext94</image:caption><image:title>blogposttext94</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-cranford-author.png</image:loc><image:caption>jjcranfordauthor</image:caption><image:title>jjcranfordauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware-blog.png</image:loc><image:caption>Ransomwareblog</image:caption><image:title>Ransomwareblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(102).png</image:loc><image:caption>blogposttext102</image:caption><image:title>blogposttext102</image:title></image:image><lastmod>2021-12-15</lastmod></url><url><loc>https://www.cybereason.com/press/defendercon-2021-keynote-speakers-announced</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-launches-north-american-mssp-program-to-empower-defender-service-providers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-04-06</lastmod></url><url><loc>https://www.cybereason.com/blog/rise-of-double-extortion-shines-spotlight-on-ransomware-prevention</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DoubleExtortion-blog.png</image:loc><image:caption>DoubleExtortionblog</image:caption><image:title>DoubleExtortionblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(75).png</image:loc><image:caption>blogposttext75</image:caption><image:title>blogposttext75</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/cybereason-nocturnus</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusa-blog.png</image:loc><image:caption>medusablog</image:caption><image:title>medusablog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-518230906.jpg</image:loc><image:caption>GettyImages518230906</image:caption><image:title>GettyImages518230906</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-61.png</image:loc><image:caption>image61</image:caption><image:title>image61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-4.png</image:loc><image:caption>PhoenixKeylogger4</image:caption><image:title>PhoenixKeylogger4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Copy%20of%20RYUK1.png</image:loc><image:caption>CopyofCopyofRYUK1</image:caption><image:title>CopyofCopyofRYUK1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-12.png</image:loc><image:caption>RaccoonBlog12</image:caption><image:title>RaccoonBlog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template-2.png</image:loc><image:caption>CybereasonVsTemplate2</image:caption><image:title>CybereasonVsTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Emotet.png</image:loc><image:caption>Emotet</image:caption><image:title>Emotet</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template.png</image:loc><image:caption>CybereasonVsTemplate</image:caption><image:title>CybereasonVsTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(96).png</image:loc><image:caption>blogposttext96</image:caption><image:title>blogposttext96</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Darkside-blog.png</image:loc><image:caption>Darksideblog</image:caption><image:title>Darksideblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20RYUK1.png</image:loc><image:caption>CopyofRYUK1</image:caption><image:title>CopyofRYUK1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-124.png</image:loc><image:caption>image124</image:caption><image:title>image124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WFH-Safe-Blog-Header.png</image:loc><image:caption>WFHSafeBlogHeader</image:caption><image:title>WFHSafeBlogHeader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template%20(2).png</image:loc><image:caption>CybereasonVsTemplate2</image:caption><image:title>CybereasonVsTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews</image:caption><image:title>CopyofBLOGSOCIALSETNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews3</image:caption><image:title>CopyofBLOGSOCIALSETNews3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews31</image:caption><image:title>CopyofBLOGSOCIALSETNews31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Aerial_Road.jpg</image:loc><image:caption>AerialRoad</image:caption><image:title>AerialRoad</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/workflow.png</image:loc><image:caption>workflow</image:caption><image:title>workflow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Wall-LARGEV2-1.png</image:loc><image:caption>WallLARGEV21</image:caption><image:title>WallLARGEV21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mobile-eventbot-hero-A.png</image:loc><image:caption>mobileeventbotheroA</image:caption><image:title>mobileeventbotheroA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-featured-image.png</image:loc><image:caption>crfeaturedimage</image:caption><image:title>crfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/op-soft-cell.jpg</image:loc><image:caption>opsoftcell</image:caption><image:title>opsoftcell</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vs-ransomware.png</image:loc><image:caption>vsransomware</image:caption><image:title>vsransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/molerats-malware-blog-hero-a.png</image:loc><image:caption>moleratsmalwareblogheroa</image:caption><image:title>moleratsmalwareblogheroa</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILITY_HUNTING_CR_ICONS-13.svg</image:loc><image:caption>VISIBILITYHUNTINGCRICONS13</image:caption><image:title>VISIBILITYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AI%20Hunting%20Tour/Ai_Hunting_Header.jpg</image:loc><image:caption>AiHuntingHeader</image:caption><image:title>AiHuntingHeader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/fingerprint-hero-blue-green.png</image:loc><image:caption>fingerprintherobluegreen</image:caption><image:title>fingerprintherobluegreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(88).png</image:loc><image:caption>blogposttext88</image:caption><image:title>blogposttext88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(3).png</image:loc><image:caption>Vs3</image:caption><image:title>Vs3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-99.png</image:loc><image:caption>image99</image:caption><image:title>image99</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-Hero-5.png</image:loc><image:caption>ValakHero5</image:caption><image:title>ValakHero5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ryuk-ransomware-illus.png</image:loc><image:caption>ryukransomwareillus</image:caption><image:title>ryukransomwareillus</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fintech-Hack-Evilnum-2.jpg</image:loc><image:caption>FintechHackEvilnum2</image:caption><image:title>FintechHackEvilnum2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/hacking-the-hackers-blog-header.png</image:loc><image:caption>hackingthehackersblogheader</image:caption><image:title>hackingthehackersblogheader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sodinokibi-blog-1.png</image:loc><image:caption>Sodinokibiblog1</image:caption><image:title>Sodinokibiblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kernel-ci.dll-blog-image.png</image:loc><image:caption>kernelcidllblogimage</image:caption><image:title>kernelcidllblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-32.png</image:loc><image:caption>WorkinprogressGlupteba32</image:caption><image:title>WorkinprogressGlupteba32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yellow%20background%20%2B%20Texture%20Sample%20(1).png</image:loc><image:caption>YellowbackgroundTextureSample1</image:caption><image:title>YellowbackgroundTextureSample1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(5)-1.png</image:loc><image:caption>image51</image:caption><image:title>image51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/palestine-attacks-blog-image.png</image:loc><image:caption>palestineattacksblogimage</image:caption><image:title>palestineattacksblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bazar-of-tricks-blog-image.png</image:loc><image:caption>bazaroftricksblogimage</image:caption><image:title>bazaroftricksblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/chaes-malware-blog-card.png</image:loc><image:caption>chaesmalwareblogcard</image:caption><image:title>chaesmalwareblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Behavioral-Intelligence-1.jpg</image:loc><image:caption>BehavioralIntelligence1</image:caption><image:title>BehavioralIntelligence1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/PortDoor-Featured-Image.png</image:loc><image:caption>PortDoorFeaturedImage</image:caption><image:title>PortDoorFeaturedImage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fakespy-centered.png</image:loc><image:caption>Fakespycentered</image:caption><image:title>Fakespycentered</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_Kimsuky%20KGH%20Spyware%20Suite%20-%20image.png</image:loc><image:caption>KimsukyKGHSpywareSuiteimage</image:caption><image:title>KimsukyKGHSpywareSuiteimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/amazon-gift-card-blog-card.png</image:loc><image:caption>amazongiftcardblogcard</image:caption><image:title>amazongiftcardblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/milan-degraeve-0ztvUdH5b-A-unsplash.jpg</image:loc><image:caption>milandegraeve0ztvUdH5bAunsplash</image:caption><image:title>milandegraeve0ztvUdH5bAunsplash</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RYUK1%20(1).png</image:loc><image:caption>RYUK11</image:caption><image:title>RYUK11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-847334548.jpg</image:loc><image:caption>GettyImages847334548</image:caption><image:title>GettyImages847334548</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bitbucket-blog-image.png</image:loc><image:caption>bitbucketblogimage</image:caption><image:title>bitbucketblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>BLOGSOCIALSETNews11</image:caption><image:title>BLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-blog-card.png</image:loc><image:caption>egregorblogcard</image:caption><image:title>egregorblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(1)-1.png</image:loc><image:caption>pastedimage011</image:caption><image:title>pastedimage011</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/the-cybereason-difference-why-pentesters-dont-want-to-be-our-valentine</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/justin-hs-hex.png</image:loc><image:caption>justinhshex</image:caption><image:title>justinhshex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/pentesters-valentines-day-blog-card.png</image:loc><image:caption>pentestersvalentinesdayblogcard</image:caption><image:title>pentestersvalentinesdayblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(122).png</image:loc><image:caption>blogposttext122</image:caption><image:title>blogposttext122</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(126).png</image:loc><image:caption>blogposttext126</image:caption><image:title>blogposttext126</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/blog/blacksuit-data-exfil</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image11.png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-inc-ransomware-featured-image.png</image:loc><image:caption>threatalertincransomwarefeaturedimage</image:caption><image:title>threatalertincransomwarefeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image15.png</image:loc><image:caption>image15</image:caption><image:title>image15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image7.png</image:loc><image:caption>image7</image:caption><image:title>image7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image5.png</image:loc><image:caption>image5</image:caption><image:title>image5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image10.png</image:loc><image:caption>image10</image:caption><image:title>image10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/citrixbleed-featured-image.png</image:loc><image:caption>citrixbleedfeaturedimage</image:caption><image:title>citrixbleedfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image12.png</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image4.png</image:loc><image:caption>image4</image:caption><image:title>image4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image3.png</image:loc><image:caption>image3</image:caption><image:title>image3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image9.png</image:loc><image:caption>image9</image:caption><image:title>image9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image13.jpg</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(23).png</image:loc><image:caption>BLOGImagesTemplatev223</image:caption><image:title>BLOGImagesTemplatev223</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image2.png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><lastmod>2025-07-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-real-life-thriller-state-sponsored-hackers-spy-on-targets-through-their-cellular-providers-report-says</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fortune-MAgazine-Logo-1.jpg</image:loc><image:caption>FortuneMAgazineLogo1</image:caption><image:title>FortuneMAgazineLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://www.cybereason.com/blog/how-xdr-delivers-on-soars-unfulfilled-promises</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(3).png</image:loc><image:caption>ImagefromiOS3</image:caption><image:title>ImagefromiOS3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(11).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews11</image:caption><image:title>CopyofBLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-2.png</image:loc><image:caption>CybereasonBlogTemplate52</image:caption><image:title>CybereasonBlogTemplate52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-the-microsoft-exchange-hack-could-impact-your-organization</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo-2.png</image:loc><image:caption>TechRepubliclogo2</image:caption><image:title>TechRepubliclogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-03-10</lastmod></url><url><loc>https://www.cybereason.com/blog/case-study-how-cybereason-helped-a-major-software-company-discover-shutdown-an-apt-that-escaped-detection-for-almost-one-year</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-252-featured.png</image:loc><image:caption>MLEp252featured</image:caption><image:title>MLEp252featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MLPodcast143.png</image:loc><image:caption>MLPodcast143</image:caption><image:title>MLPodcast143</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_322122452-1000x391.jpg</image:loc><image:caption>shutterstock3221224521000x391</image:caption><image:title>shutterstock3221224521000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-signs-oem-agreement-with-opswat-</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iranian-hackers-using-new-powershell-backdoor-in-espionage-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Hacker%20News%20logo-1.jpg</image:loc><image:caption>TheHackerNewslogo1</image:caption><image:title>TheHackerNewslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-02-03</lastmod></url><url><loc>https://www.cybereason.com/blog/oracle-ebs-extortion-cl0p</loc><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(1).png</image:loc><image:caption>BLOGImagesTemplatev21</image:caption><image:title>BLOGImagesTemplatev21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(24).png</image:loc><image:caption>BLOGImagesTemplatev224</image:caption><image:title>BLOGImagesTemplatev224</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(27).png</image:loc><image:caption>BLOGImagesTemplatev227</image:caption><image:title>BLOGImagesTemplatev227</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/intrusion%20path.png</image:loc><image:caption>intrusionpath</image:caption><image:title>intrusionpath</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2025-10-07</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-smarttech247-partner-to-tackle-advanced-cyber-threats-with-realtime-expert-monitoring</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-09-08</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-mitre-attack-flow-project</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(42).png</image:loc><image:caption>blogposttext42</image:caption><image:title>blogposttext42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-author.png</image:loc><image:caption>israelauthor</image:caption><image:title>israelauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ingrid_Skoog.jpg</image:loc><image:caption>IngridSkoog</image:caption><image:title>IngridSkoog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><lastmod>2022-04-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/russia-arrests-14-alleged-members-of-revil-ransomware-gang</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CBS%20News%20logo-4.jpg</image:loc><image:caption>CBSNewslogo4</image:caption><image:title>CBSNewslogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-launches-new-complete-next-generation-endpoint-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-attacks-against-hospitals-have-significantly-increased-as-hackers-seek-to-maximize-profits</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/forbes-logo-12.gif</image:loc><image:caption>forbeslogo12</image:caption><image:title>forbeslogo12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-04-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/lockbit-ransomware-techniques-detailed</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Jul-20-2022-02-24-44-08-AM.png</image:loc><image:caption>SCMagazinelogoJul20202202244408AM</image:caption><image:title>SCMagazinelogoJul20202202244408AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/targeted-attack-exposes-owa-weakness</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/unnamed-1.jpg</image:loc><image:caption>unnamed1</image:caption><image:title>unnamed1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/identity-is-front-and-center-for-cybereason-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITPro%20logo.png</image:loc><image:caption>ITPrologo</image:caption><image:title>ITPrologo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-11-16</lastmod></url><url><loc>https://www.cybereason.com/blog/what-sets-cybereason-apart-from-other-end-point-products</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-4.jpg</image:loc><image:caption>Untitleddesign4</image:caption><image:title>Untitleddesign4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(15).png</image:loc><image:caption>BLOGImagesTemplatev215</image:caption><image:title>BLOGImagesTemplatev215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(11).png</image:loc><image:caption>BLOGImagesTemplatev211</image:caption><image:title>BLOGImagesTemplatev211</image:title></image:image><lastmod>2018-04-05</lastmod></url><url><loc>https://www.cybereason.com/blog/the-untold-story-of-the-rsa-breach-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dave%20Castignola.jpg</image:loc><image:caption>DaveCastignola</image:caption><image:title>DaveCastignola</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/112%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>112MALICIOUSLIFE</image:caption><image:title>112MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-10-coolest-new-cybersecurity-tools-and-products-of-2020</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN%20logo.png</image:loc><image:caption>CRNlogo</image:caption><image:title>CRNlogo</image:title></image:image><lastmod>2020-07-15</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/marisa-ianelli</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IWD%20blog%20Marisa%20Ianelli.png</image:loc><image:caption>IWDblogMarisaIanelli</image:caption><image:title>IWDblogMarisaIanelli</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Marisa%20Ianelli.png</image:loc><image:caption>MarisaIanelli</image:caption><image:title>MarisaIanelli</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/10-cybersecurity-predictions-for-2018</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CRN-Logo-800x392.png</image:loc><image:caption>CRNLogo800x392</image:caption><image:title>CRNLogo800x392</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-and-smarttech-ink-partnership</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-Sep-22-2021-01-20-19-84-AM.png</image:loc><image:caption>MSSPAlertlogoSep22202101201984AM</image:caption><image:title>MSSPAlertlogoSep22202101201984AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-09-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/businesses-worried-about-holiday-cyberattacks-and-for-good-reason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20News%20logo-3.png</image:loc><image:caption>YahooNewslogo3</image:caption><image:title>YahooNewslogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-11-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-ransomware-tale-mayor-describes-citys-decisions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/gov%20info%20security%20logo.png</image:loc><image:caption>govinfosecuritylogo</image:caption><image:title>govinfosecuritylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/blog/the-xdr-advantage-eliminate-dwell-time-and-gain-visibility</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(72).png</image:loc><image:caption>blogposttext72</image:caption><image:title>blogposttext72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(34).png</image:loc><image:caption>CybereasonBlogTemplate34</image:caption><image:title>CybereasonBlogTemplate34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-18T125623.731.png</image:loc><image:caption>blogposttext20220718T125623731</image:caption><image:title>blogposttext20220718T125623731</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/winnti-threat-group-rides-again-with-ip-theft-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Searchsecurity%20logo-4.jpg</image:loc><image:caption>Searchsecuritylogo4</image:caption><image:title>Searchsecuritylogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/press-releases/former-top-cia-executive-joins-cybereason-advisory-board</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/how-to-quickly-and-easily-pivot-an-investigation-with-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blank-avatar.png</image:loc><image:caption>blankavatar</image:caption><image:title>blankavatar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_357967580.jpg</image:loc><image:caption>shutterstock357967580</image:caption><image:title>shutterstock357967580</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2018-12-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-warns-of-rapid-increase-in-royal-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Searchsecurity%20logo-Dec-14-2022-07-21-01-3220-PM.jpg</image:loc><image:caption>SearchsecuritylogoDec1420220721013220PM</image:caption><image:title>SearchsecuritylogoDec1420220721013220PM</image:title></image:image><lastmod>2022-12-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fake-amazon-gift-cards-deliver-dridex-trojan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Jan-04-2021-01-28-03-67-AM.png</image:loc><image:caption>BankinfosecuritylogoJan04202101280367AM</image:caption><image:title>BankinfosecuritylogoJan04202101280367AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-01-04</lastmod></url><url><loc>https://www.cybereason.com/resources/upcoming-webinar-the-cyber-defense-challenge-journey</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blue_Concrete-1.jpg</image:loc><image:caption>BlueConcrete1</image:caption><image:title>BlueConcrete1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2019-02-28</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-yonatan-striem-amit-in-infoworld-rising-from-the-coding-ranks-to-become-a-cto-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113218.959.png</image:loc><image:caption>blogposttext20220920T113218959</image:caption><image:title>blogposttext20220920T113218959</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_309230501.jpg</image:loc><image:caption>shutterstock309230501</image:caption><image:title>shutterstock309230501</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/xdr-is-here-how-and-why-to-get-started</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(76).png</image:loc><image:caption>blogposttext76</image:caption><image:title>blogposttext76</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-13T051646.778.png</image:loc><image:caption>blogposttext20220713T051646778</image:caption><image:title>blogposttext20220713T051646778</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(28).png</image:loc><image:caption>blogposttext28</image:caption><image:title>blogposttext28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-03-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/deadringer-targeted-exchange-servers-long-before-discovery</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ThreatPost%20logo-4.png</image:loc><image:caption>ThreatPostlogo4</image:caption><image:title>ThreatPostlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-08-04</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-how-advanced-is-your-soc-insights-from-the-2017-threat-hunting-survey-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-30.png</image:loc><image:caption>Untitleddesign30</image:caption><image:title>Untitleddesign30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T072538.395.png</image:loc><image:caption>blogposttext20220920T072538395</image:caption><image:title>blogposttext20220920T072538395</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(106).png</image:loc><image:caption>blogposttext106</image:caption><image:title>blogposttext106</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/press/new-cybereason-ransomware-study-reveals-true-cost-to-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-06-16</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/bad-rabbit-ransomware-strikes-russia-and-ukraine</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Gizmodo.jpg</image:loc><image:caption>Gizmodo</image:caption><image:title>Gizmodo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/fundamentals/what-is-ransomware</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/dark-metal-background.png</image:loc><image:caption>darkmetalbackground</image:caption><image:title>darkmetalbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/101-what-is-ransomware-featured.png</image:loc><image:caption>101whatisransomwarefeatured</image:caption><image:title>101whatisransomwarefeatured</image:title></image:image><lastmod>2023-04-20</lastmod></url><url><loc>https://www.cybereason.com/consulting/resilience-retainer-incident-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-gen-feat-img-web.png</image:loc><image:caption>cybereasongenfeatimgweb</image:caption><image:title>cybereasongenfeatimgweb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/preventid-flippedSML.png</image:loc><image:caption>preventidflippedSML</image:caption><image:title>preventidflippedSML</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Consulting%20Team/resilience-retainer-tier-options2.png</image:loc><image:caption>resilienceretainertieroptions2</image:caption><image:title>resilienceretainertieroptions2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/TECH_DEEPDIVE_KNOWLEDGE_CR_ICONS-27.svg</image:loc><image:caption>TECHDEEPDIVEKNOWLEDGECRICONS27</image:caption><image:title>TECHDEEPDIVEKNOWLEDGECRICONS27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Mitre%20Blog%202026.png</image:loc><image:caption>CybereasonMitreBlog2026</image:caption><image:title>CybereasonMitreBlog2026</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/CR_ICONS_SET_3-02.svg</image:loc><image:caption>CRICONSSET302</image:caption><image:title>CRICONSSET302</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-spine-bg--posture-incident-management-d.jpg</image:loc><image:caption>crplatformspinebgpostureincidentmanagementd</image:caption><image:title>crplatformspinebgpostureincidentmanagementd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/respondor-v2-500px.png</image:loc><image:caption>respondorv2500px</image:caption><image:title>respondorv2500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DurrantProfilePic2025.png</image:loc><image:caption>DurrantProfilePic2025</image:caption><image:title>DurrantProfilePic2025</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/Headshots/Chris%20White%20Headshot.png</image:loc><image:caption>ChrisWhiteHeadshot</image:caption><image:title>ChrisWhiteHeadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/denman-headshot.png</image:loc><image:caption>denmanheadshot</image:caption><image:title>denmanheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-hero-protector-with-hex-bg.png</image:loc><image:caption>crheroprotectorwithhexbg</image:caption><image:title>crheroprotectorwithhexbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/SAVINGS_CR_ICONS-38.svg</image:loc><image:caption>SAVINGSCRICONS38</image:caption><image:title>SAVINGSCRICONS38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(36).png</image:loc><image:caption>BLOGImagesTemplatev236</image:caption><image:title>BLOGImagesTemplatev236</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/NETWORK_ARCHITECTURE_CR_ICONS_BATCH_2%20copy-20.svg</image:loc><image:caption>NETWORKARCHITECTURECRICONSBATCH2copy20</image:caption><image:title>NETWORKARCHITECTURECRICONSBATCH2copy20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20consulting%20infographic.png</image:loc><image:caption>cybereasonconsultinginfographic</image:caption><image:title>cybereasonconsultinginfographic</image:title></image:image><lastmod>2025-05-19</lastmod></url><url><loc>https://www.cybereason.com/blog/ever-evolving-yonatan-striem-amit-on-handling-breaches-while-remote-author-allie-mellen</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ever-Evolving-YSA-Cover.png</image:loc><image:caption>EverEvolvingYSACover</image:caption><image:title>EverEvolvingYSACover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yonaton-Striem-Amit-HS.png</image:loc><image:caption>YonatonStriemAmitHS</image:caption><image:title>YonatonStriemAmitHS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/blog/research/powerless-trojan-iranian-apt-phosphorus-adds-new-powershell-backdoor-for-espionage</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Jan-18-2022-06-49-16-90-PM.png</image:loc><image:caption>image10Jan18202206491690PM</image:caption><image:title>image10Jan18202206491690PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Jan-18-2022-06-39-52-05-PM.png</image:loc><image:caption>image1Jan18202206395205PM</image:caption><image:title>image1Jan18202206395205PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Jan-18-2022-07-08-06-33-PM.png</image:loc><image:caption>image8Jan18202207080633PM</image:caption><image:title>image8Jan18202207080633PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Jan-18-2022-07-09-48-95-PM.png</image:loc><image:caption>image7Jan18202207094895PM</image:caption><image:title>image7Jan18202207094895PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image28-Jan-18-2022-06-51-20-81-PM.png</image:loc><image:caption>image28Jan18202206512081PM</image:caption><image:title>image28Jan18202206512081PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image22-Jan-18-2022-06-52-57-35-PM.png</image:loc><image:caption>image22Jan18202206525735PM</image:caption><image:title>image22Jan18202206525735PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-Jan-18-2022-07-04-56-80-PM.png</image:loc><image:caption>image24Jan18202207045680PM</image:caption><image:title>image24Jan18202207045680PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-Jan-18-2022-06-45-44-09-PM.png</image:loc><image:caption>image23Jan18202206454409PM</image:caption><image:title>image23Jan18202206454409PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27-Jan-18-2022-07-09-10-16-PM.png</image:loc><image:caption>image27Jan18202207091016PM</image:caption><image:title>image27Jan18202207091016PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image26-4.png</image:loc><image:caption>image264</image:caption><image:title>image264</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Jan-18-2022-06-54-11-35-PM.png</image:loc><image:caption>image4Jan18202206541135PM</image:caption><image:title>image4Jan18202206541135PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-Jan-18-2022-06-58-07-01-PM.png</image:loc><image:caption>image20Jan18202206580701PM</image:caption><image:title>image20Jan18202206580701PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Daniel-F-HS-1-1-1.png</image:loc><image:caption>DanielFHS111</image:caption><image:title>DanielFHS111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-Jan-18-2022-06-59-18-67-PM.png</image:loc><image:caption>image21Jan18202206591867PM</image:caption><image:title>image21Jan18202206591867PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Jan-18-2022-06-50-10-09-PM.png</image:loc><image:caption>image14Jan18202206501009PM</image:caption><image:title>image14Jan18202206501009PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Jan-18-2022-06-40-52-18-PM.png</image:loc><image:caption>image9Jan18202206405218PM</image:caption><image:title>image9Jan18202206405218PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Jan-19-2022-08-20-16-82-PM.png</image:loc><image:caption>image3Jan19202208201682PM</image:caption><image:title>image3Jan19202208201682PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Jan-18-2022-07-07-32-13-PM.png</image:loc><image:caption>image5Jan18202207073213PM</image:caption><image:title>image5Jan18202207073213PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Jan-18-2022-07-10-58-10-PM.png</image:loc><image:caption>image11Jan18202207105810PM</image:caption><image:title>image11Jan18202207105810PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-Jan-18-2022-06-55-04-03-PM.png</image:loc><image:caption>image17Jan18202206550403PM</image:caption><image:title>image17Jan18202206550403PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Jan-18-2022-07-05-53-63-PM.png</image:loc><image:caption>image13Jan18202207055363PM</image:caption><image:title>image13Jan18202207055363PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>BLOGSOCIALSETNews11</image:caption><image:title>BLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Jan-18-2022-06-52-29-45-PM.png</image:loc><image:caption>image16Jan18202206522945PM</image:caption><image:title>image16Jan18202206522945PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Jan-18-2022-06-56-15-93-PM.png</image:loc><image:caption>image15Jan18202206561593PM</image:caption><image:title>image15Jan18202206561593PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image29-3.png</image:loc><image:caption>image293</image:caption><image:title>image293</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image25-Jan-18-2022-07-06-48-96-PM.png</image:loc><image:caption>image25Jan18202207064896PM</image:caption><image:title>image25Jan18202207064896PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Jan-18-2022-07-03-07-31-PM.png</image:loc><image:caption>image6Jan18202207030731PM</image:caption><image:title>image6Jan18202207030731PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-Jan-18-2022-06-57-18-37-PM.png</image:loc><image:caption>image18Jan18202206571837PM</image:caption><image:title>image18Jan18202206571837PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Jan-18-2022-06-41-31-59-PM.png</image:loc><image:caption>image2Jan18202206413159PM</image:caption><image:title>image2Jan18202206413159PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Jan-18-2022-06-48-28-42-PM.png</image:loc><image:caption>image12Jan18202206482842PM</image:caption><image:title>image12Jan18202206482842PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-Jan-18-2022-07-00-06-07-PM.png</image:loc><image:caption>image19Jan18202207000607PM</image:caption><image:title>image19Jan18202207000607PM</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/charles-river-ventures-invests-4.6-mln-in-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/pe_hub_canada.jpg</image:loc><image:caption>pehubcanada</image:caption><image:title>pehubcanada</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/global-business-partners-code-of-conduct</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-special-the-solarwinds-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>140MALICIOUSLIFE</image:caption><image:title>140MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel%20barak.jpg</image:loc><image:caption>israelbarak</image:caption><image:title>israelbarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-229-Card.png</image:loc><image:caption>MLEp229Card</image:caption><image:title>MLEp229Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/96%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>96MALICIOUSLIFE</image:caption><image:title>96MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/dcom-lateral-movement-techniques</loc><image:image><image:loc>https://www.cybereason.com/hubfs/progid.png</image:loc><image:caption>progid</image:caption><image:title>progid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-1.png</image:loc><image:caption>image131</image:caption><image:title>image131</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(107).png</image:loc><image:caption>blogposttext107</image:caption><image:title>blogposttext107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-3.png</image:loc><image:caption>image33</image:caption><image:title>image33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/lat%20mov%20image%203.png</image:loc><image:caption>latmovimage3</image:caption><image:title>latmovimage3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/phil.jpg</image:loc><image:caption>phil</image:caption><image:title>phil</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/access.png</image:loc><image:caption>access</image:caption><image:title>access</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/word.png</image:loc><image:caption>word</image:caption><image:title>word</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4%20for%20lat%20mov.png</image:loc><image:caption>image4forlatmov</image:caption><image:title>image4forlatmov</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-2.png</image:loc><image:caption>image172</image:caption><image:title>image172</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/lat%20mov%20image%202-3.png</image:loc><image:caption>latmovimage23</image:caption><image:title>latmovimage23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CybereasonBlogHeroTemplate</image:caption><image:title>CybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-2.png</image:loc><image:caption>image122</image:caption><image:title>image122</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/outllok1.png</image:loc><image:caption>outllok1</image:caption><image:title>outllok1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-1.png</image:loc><image:caption>image211</image:caption><image:title>image211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pp.png</image:loc><image:caption>pp</image:caption><image:title>pp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/outlook2.png</image:loc><image:caption>outlook2</image:caption><image:title>outlook2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/excel1.png</image:loc><image:caption>excel1</image:caption><image:title>excel1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Deep%20Sensor-Architecture-1.jpg</image:loc><image:caption>DeepSensorArchitecture1</image:caption><image:title>DeepSensorArchitecture1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/outllokscript.png</image:loc><image:caption>outllokscript</image:caption><image:title>outllokscript</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/macro.png</image:loc><image:caption>macro</image:caption><image:title>macro</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-1.png</image:loc><image:caption>image201</image:caption><image:title>image201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/excel.png</image:loc><image:caption>excel</image:caption><image:title>excel</image:title></image:image><lastmod>2021-06-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/singapore-companies-pay-average-s1.5m-after-ransomware-attack-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Business%20Times%20logo.png</image:loc><image:caption>TheBusinessTimeslogo</image:caption><image:title>TheBusinessTimeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2022-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-did-you-ask-for-and-get-too-much-security-budget</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(1)-1.png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/James%20Christiansen.png</image:loc><image:caption>JamesChristiansen</image:caption><image:title>JamesChristiansen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-report-bumblebee-loader-the-high-road-to-enterprise-domain-control</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(125).png</image:loc><image:caption>blogposttext125</image:caption><image:title>blogposttext125</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Aug-15-2022-07-24-03-49-PM.png</image:loc><image:caption>image13Aug15202207240349PM</image:caption><image:title>image13Aug15202207240349PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Aug-15-2022-07-15-35-81-PM.png</image:loc><image:caption>image6Aug15202207153581PM</image:caption><image:title>image6Aug15202207153581PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Aug-15-2022-07-25-42-84-PM.png</image:loc><image:caption>image5Aug15202207254284PM</image:caption><image:title>image5Aug15202207254284PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-1.jpg</image:loc><image:caption>image191</image:caption><image:title>image191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Aug-15-2022-07-20-34-00-PM.png</image:loc><image:caption>image1Aug15202207203400PM</image:caption><image:title>image1Aug15202207203400PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-Aug-15-2022-07-19-35-33-PM.png</image:loc><image:caption>image18Aug15202207193533PM</image:caption><image:title>image18Aug15202207193533PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Aug-15-2022-07-31-46-08-PM.png</image:loc><image:caption>image14Aug15202207314608PM</image:caption><image:title>image14Aug15202207314608PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-Aug-15-2022-07-33-11-94-PM.png</image:loc><image:caption>image20Aug15202207331194PM</image:caption><image:title>image20Aug15202207331194PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Aug-15-2022-07-22-47-38-PM.png</image:loc><image:caption>image16Aug15202207224738PM</image:caption><image:title>image16Aug15202207224738PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Aug-15-2022-07-18-44-12-PM.png</image:loc><image:caption>image2Aug15202207184412PM</image:caption><image:title>image2Aug15202207184412PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T115923.524.png</image:loc><image:caption>blogposttext20220815T115923524</image:caption><image:title>blogposttext20220815T115923524</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Aug-15-2022-07-16-49-25-PM.png</image:loc><image:caption>image11Aug15202207164925PM</image:caption><image:title>image11Aug15202207164925PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-Aug-15-2022-07-21-22-95-PM.png</image:loc><image:caption>image21Aug15202207212295PM</image:caption><image:title>image21Aug15202207212295PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-Aug-15-2022-07-14-40-81-PM.png</image:loc><image:caption>image17Aug15202207144081PM</image:caption><image:title>image17Aug15202207144081PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Aug-15-2022-07-17-43-18-PM.png</image:loc><image:caption>image15Aug15202207174318PM</image:caption><image:title>image15Aug15202207174318PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Aug-15-2022-07-27-06-10-PM.png</image:loc><image:caption>image8Aug15202207270610PM</image:caption><image:title>image8Aug15202207270610PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Aug-15-2022-07-24-55-39-PM.png</image:loc><image:caption>image9Aug15202207245539PM</image:caption><image:title>image9Aug15202207245539PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-2.jpg</image:loc><image:caption>image122</image:caption><image:title>image122</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Aug-15-2022-07-28-45-50-PM.png</image:loc><image:caption>image10Aug15202207284550PM</image:caption><image:title>image10Aug15202207284550PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Aug-15-2022-07-29-34-00-PM.png</image:loc><image:caption>image3Aug15202207293400PM</image:caption><image:title>image3Aug15202207293400PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Aug-15-2022-07-26-15-14-PM.png</image:loc><image:caption>image4Aug15202207261514PM</image:caption><image:title>image4Aug15202207261514PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T074703.175.png</image:loc><image:caption>blogposttext20220627T074703175</image:caption><image:title>blogposttext20220627T074703175</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Aug-15-2022-07-30-20-12-PM.png</image:loc><image:caption>image7Aug15202207302012PM</image:caption><image:title>image7Aug15202207302012PM</image:title></image:image><lastmod>2022-08-17</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/david-bisson</loc><image:image><image:loc>https://www.cybereason.com/hubfs/solarwinds-blog-hero-2.png</image:loc><image:caption>solarwindsbloghero2</image:caption><image:title>solarwindsbloghero2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/covid-vaccine-blog-card.png</image:loc><image:caption>covidvaccineblogcard</image:caption><image:title>covidvaccineblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/150K%20Surveillance%20Cameras.png</image:loc><image:caption>150KSurveillanceCameras</image:caption><image:title>150KSurveillanceCameras</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Emotet%20Takedown.png</image:loc><image:caption>EmotetTakedown</image:caption><image:title>EmotetTakedown</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FBI%20Cybercrime-blog.png</image:loc><image:caption>FBICybercrimeblog</image:caption><image:title>FBICybercrimeblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(17).png</image:loc><image:caption>CybereasonBlogTemplate17</image:caption><image:title>CybereasonBlogTemplate17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ubiquiti-Hero.png</image:loc><image:caption>UbiquitiHero</image:caption><image:title>UbiquitiHero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FacebookHack-blog.png</image:loc><image:caption>FacebookHackblog</image:caption><image:title>FacebookHackblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/kia-ransomware-blog-card.png</image:loc><image:caption>kiaransomwareblogcard</image:caption><image:title>kiaransomwareblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(2).png</image:loc><image:caption>CybereasonBlogTemplate2</image:caption><image:title>CybereasonBlogTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/executive-order-blog-card.png</image:loc><image:caption>executiveorderblogcard</image:caption><image:title>executiveorderblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/data-breach-lock-blog-card.png</image:loc><image:caption>databreachlockblogcard</image:caption><image:title>databreachlockblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SolarWinds%20Attacks%20Recovery%20Effort%20Could%20Take%20U.S.%20Government%2018%20Months.png</image:loc><image:caption>SolarWindsAttacksRecoveryEffortCouldTakeUSGovernment18Months</image:caption><image:title>SolarWindsAttacksRecoveryEffortCouldTakeUSGovernment18Months</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post.png</image:loc><image:caption>blogpost</image:caption><image:title>blogpost</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/healthcare-data-extortion-blog-card.png</image:loc><image:caption>healthcaredataextortionblogcard</image:caption><image:title>healthcaredataextortionblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(42).png</image:loc><image:caption>CybereasonBlogTemplate42</image:caption><image:title>CybereasonBlogTemplate42</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/to-automate-or-not-to-automate-incident-response-that-is-the-question-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/network_world.jpg</image:loc><image:caption>networkworld</image:caption><image:title>networkworld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/trump-cybersecurity-directive-leading-cyber-expert-calls-for-clarity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict-Logo.jpg</image:loc><image:caption>VerdictLogo</image:caption><image:title>VerdictLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-08-16</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-edr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-edr-datasheet--thumb.jpg</image:loc><image:caption>credrdatasheetthumb</image:caption><image:title>credrdatasheetthumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-02-09</lastmod></url><url><loc>https://www.cybereason.com/blog/unboxing-snake-python-infostealer-lurking-through-messaging-service</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-18.png</image:loc><image:caption>snakeinfostealerblog18</image:caption><image:title>snakeinfostealerblog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-6.png</image:loc><image:caption>snakeinfostealerblog6</image:caption><image:title>snakeinfostealerblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-9.jpg</image:loc><image:caption>snakeinfostealerblog9</image:caption><image:title>snakeinfostealerblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-14.png</image:loc><image:caption>snakeinfostealerblog14</image:caption><image:title>snakeinfostealerblog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-10.png</image:loc><image:caption>snakeinfostealerblog10</image:caption><image:title>snakeinfostealerblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-18b.png</image:loc><image:caption>snakeinfostealerblog18b</image:caption><image:title>snakeinfostealerblog18b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-5.png</image:loc><image:caption>snakeinfostealerblog5</image:caption><image:title>snakeinfostealerblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-1.jpg</image:loc><image:caption>snakeinfostealerblog1</image:caption><image:title>snakeinfostealerblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-4.png</image:loc><image:caption>snakeinfostealerblog4</image:caption><image:title>snakeinfostealerblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-20.png</image:loc><image:caption>snakeinfostealerblog20</image:caption><image:title>snakeinfostealerblog20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-15.png</image:loc><image:caption>snakeinfostealerblog15</image:caption><image:title>snakeinfostealerblog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-3.jpg</image:loc><image:caption>snakeinfostealerblog3</image:caption><image:title>snakeinfostealerblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-13.jpg</image:loc><image:caption>snakeinfostealerblog13</image:caption><image:title>snakeinfostealerblog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/behind-closed-doors-rise-of-remote-access-featured.png</image:loc><image:caption>behindcloseddoorsriseofremoteaccessfeatured</image:caption><image:title>behindcloseddoorsriseofremoteaccessfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/hardbit-threat-analysis-featured.png</image:loc><image:caption>hardbitthreatanalysisfeatured</image:caption><image:title>hardbitthreatanalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-16.jpg</image:loc><image:caption>snakeinfostealerblog16</image:caption><image:title>snakeinfostealerblog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-2.jpg</image:loc><image:caption>snakeinfostealerblog2</image:caption><image:title>snakeinfostealerblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-17.jpg</image:loc><image:caption>snakeinfostealerblog17</image:caption><image:title>snakeinfostealerblog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/snake-python-infostealer-blog-featured.png</image:loc><image:caption>snakepythoninfostealerblogfeatured</image:caption><image:title>snakepythoninfostealerblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-8.png</image:loc><image:caption>snakeinfostealerblog8</image:caption><image:title>snakeinfostealerblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-7.jpg</image:loc><image:caption>snakeinfostealerblog7</image:caption><image:title>snakeinfostealerblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-12.png</image:loc><image:caption>snakeinfostealerblog12</image:caption><image:title>snakeinfostealerblog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-22.png</image:loc><image:caption>snakeinfostealerblog22</image:caption><image:title>snakeinfostealerblog22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Kotaro-Ogino.jpg</image:loc><image:caption>KotaroOgino</image:caption><image:title>KotaroOgino</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-3.png</image:loc><image:caption>snakeinfostealerblog3</image:caption><image:title>snakeinfostealerblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-11.jpg</image:loc><image:caption>snakeinfostealerblog11</image:caption><image:title>snakeinfostealerblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-21.png</image:loc><image:caption>snakeinfostealerblog21</image:caption><image:title>snakeinfostealerblog21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-infostealer-blog-19.png</image:loc><image:caption>snakeinfostealerblog19</image:caption><image:title>snakeinfostealerblog19</image:title></image:image><lastmod>2024-03-05</lastmod></url><url><loc>https://www.cybereason.com/resources/banking-trojan-delivered-by-lolbins-how-the-ramnit-trojan-spreads-via-sload-in-a-cyberattack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(8).png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2019-01-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-have-stolen-years-of-data-on-specific-individuals-from-10-global-cell-networks-in-suspected-chinese-espionage-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Daily%20Mail.jpg</image:loc><image:caption>DailyMail</image:caption><image:title>DailyMail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2019-06-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/big-data-security-analytics-landscape</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/work_bench.jpg</image:loc><image:caption>workbench</image:caption><image:title>workbench</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-whatsapp-spyware-was-created-by-a-private-company-and-thats-a-bigger-concern-than-security-flaws</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict-Logo-6.jpg</image:loc><image:caption>VerdictLogo6</image:caption><image:title>VerdictLogo6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/blog/sc-magazine-2015-will-see-the-best-next-gen-endpoint-solutions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/cleardot-1.gif</image:loc><image:caption>cleardot1</image:caption><image:title>cleardot1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/resources/the-challenges-of-detecting-compromised-public-web-servers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Adylkuzz%20banner.jpg</image:loc><image:caption>Adylkuzzbanner</image:caption><image:title>Adylkuzzbanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-04-19</lastmod></url><url><loc>https://www.cybereason.com/resources/webinar-ciso-roundtable-top-ciso-priorities-for-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/CISO-Roundtable-Top-CISO-Priorities-for-2022-Webinar-Featured-Image.png</image:loc><image:caption>CISORoundtableTopCISOPrioritiesfor2022WebinarFeaturedImage</image:caption><image:title>CISORoundtableTopCISOPrioritiesfor2022WebinarFeaturedImage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-16</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-declares-war-on-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-nocturnus-research-team-discovers-hackers-are-using-new-stealthy-techniques-to-deliver-gandcrab-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-infinigate-group-announce-new-partnership</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-09-14</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-nabs-three-built-in-bostons-best-places-to-work-2022-awards</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(25).png</image:loc><image:caption>blogposttext25</image:caption><image:title>blogposttext25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog_BestinBoston.png</image:loc><image:caption>BlogBestinBoston</image:caption><image:title>BlogBestinBoston</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20Sibel%20Narin-Farooq.png</image:loc><image:caption>EmployeeSpotlightSibelNarinFarooq</image:caption><image:title>EmployeeSpotlightSibelNarinFarooq</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-01-05</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-closes-25-million-series-b-funding-enters-lockheed-martin-partnership</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-25</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-how-boards-can-take-responsibility-for-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/board%20and%20cyber.jpg</image:loc><image:caption>boardandcyber</image:caption><image:title>boardandcyber</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(18).png</image:loc><image:caption>CybereasonBlogTemplate18</image:caption><image:title>CybereasonBlogTemplate18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/beast-ransomware-blog-featured.png</image:loc><image:caption>beastransomwareblogfeatured</image:caption><image:title>beastransomwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ta505-spear-phishing-campaign-uses-lolbins-to-avoid-detection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BleepingComputer%20logo-1.jpg</image:loc><image:caption>BleepingComputerlogo1</image:caption><image:title>BleepingComputerlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2019-04-26</lastmod></url><url><loc>https://www.cybereason.com/blog/permission-to-execute-the-incident-of-the-signed-and-verified-rat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Block-supreme-features.png</image:loc><image:caption>Blocksupremefeatures</image:caption><image:title>Blocksupremefeatures</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_313643477-1000x391.jpg</image:loc><image:caption>shutterstock3136434771000x391</image:caption><image:title>shutterstock3136434771000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Windows_alert.png</image:loc><image:caption>Windowsalert</image:caption><image:title>Windowsalert</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-229-Card.png</image:loc><image:caption>MLEp229Card</image:caption><image:title>MLEp229Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Yana%20Blachman.jpg</image:loc><image:caption>YanaBlachman</image:caption><image:title>YanaBlachman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/AV-pop-up.png</image:loc><image:caption>AVpopup</image:caption><image:title>AVpopup</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/company/leadership</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg-inspektus-wireframe-wing.png</image:loc><image:caption>crbginspektuswireframewing</image:caption><image:title>crbginspektuswireframewing</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Headshot%20-%20Israel%20Barak.png</image:loc><image:caption>HeadshotIsraelBarak</image:caption><image:title>HeadshotIsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/yoshida_202505-1.jpg</image:loc><image:caption>yoshida2025051</image:caption><image:title>yoshida2025051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Allyson-Carr-headshot.png</image:loc><image:caption>AllysonCarrheadshot</image:caption><image:title>AllysonCarrheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Manish-Narula-CybereasonSML.jpg</image:loc><image:caption>ManishNarulaCybereasonSML</image:caption><image:title>ManishNarulaCybereasonSML</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Greg-Puff-Aug2025.jpeg</image:loc><image:caption>GregPuffAug2025</image:caption><image:title>GregPuffAug2025</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Customer%20Logos/liberty-logo.png</image:loc><image:caption>libertylogo</image:caption><image:title>libertylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Customer%20Logos/SoftBank-Vision-Fund-cr.png</image:loc><image:caption>SoftBankVisionFundcr</image:caption><image:title>SoftBankVisionFundcr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/spark-capital-svg-white.svg</image:loc><image:caption>sparkcapitalsvgwhite</image:caption><image:title>sparkcapitalsvgwhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SoftBank_Logo.svg</image:loc><image:caption>SoftBankLogo</image:caption><image:title>SoftBankLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Customer%20Logos/crv-svg-white.svg</image:loc><image:caption>crvsvgwhite</image:caption><image:title>crvsvgwhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vincent%20Peulvey_RVSD.jpg</image:loc><image:caption>VincentPeulveyRVSD</image:caption><image:title>VincentPeulveyRVSD</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ben%20D%20headshot.png</image:loc><image:caption>BenDheadshot</image:caption><image:title>BenDheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RVSDSakurada-san.jpeg</image:loc><image:caption>RVSDSakuradasan</image:caption><image:title>RVSDSakuradasan</image:title></image:image><lastmod>2025-11-25</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-executives-abigail-maines-and-stephan-tallent-named-2022-crn-channel-chiefs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Defendercon_LP_no%20time.jpg</image:loc><image:caption>1200x627DefenderconLPnotime</image:caption><image:title>1200x627DefenderconLPnotime</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(12).png</image:loc><image:caption>blogposttext12</image:caption><image:title>blogposttext12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(35).png</image:loc><image:caption>blogposttext35</image:caption><image:title>blogposttext35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-07-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/conti-ransomware-operation-shut-down-after-splitting-into-smaller-groups</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Hacker%20News%20logo-1.png</image:loc><image:caption>TheHackerNewslogo1</image:caption><image:title>TheHackerNewslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-life-and-exploits-of-albert-gonzales-part-3</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(5)-1.png</image:loc><image:caption>pastedimage051</image:caption><image:title>pastedimage051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/120-%20MALICIOUS%20LIFE.png</image:loc><image:caption>120MALICIOUSLIFE</image:caption><image:title>120MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-strategic-executive-hires-and-successful-funding-round-to-drive-global-growth</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-09-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-u.s.-is-in-a-5g-race-against-china</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20Finance.jpg</image:loc><image:caption>YahooFinance</image:caption><image:title>YahooFinance</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-real-story-of-citibanks-10m-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-232-Card.png</image:loc><image:caption>MLEp232Card</image:caption><image:title>MLEp232Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/research/prometei-botnet-exploiting-microsoft-exchange-vulnerabilities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-12.png</image:loc><image:caption>prometeiblogimage12</image:caption><image:title>prometeiblogimage12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-4.png</image:loc><image:caption>prometeiblogimage4</image:caption><image:title>prometeiblogimage4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-9.png</image:loc><image:caption>prometeiblogimage9</image:caption><image:title>prometeiblogimage9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-8.png</image:loc><image:caption>prometeiblogimage8</image:caption><image:title>prometeiblogimage8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-17.png</image:loc><image:caption>prometeiblogimage17</image:caption><image:title>prometeiblogimage17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-27.png</image:loc><image:caption>prometeiblogimage27</image:caption><image:title>prometeiblogimage27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-18.png</image:loc><image:caption>prometeiblogimage18</image:caption><image:title>prometeiblogimage18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-19.png</image:loc><image:caption>prometeiblogimage19</image:caption><image:title>prometeiblogimage19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-6.png</image:loc><image:caption>prometeiblogimage6</image:caption><image:title>prometeiblogimage6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-26.png</image:loc><image:caption>prometeiblogimage26</image:caption><image:title>prometeiblogimage26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-23.png</image:loc><image:caption>prometeiblogimage23</image:caption><image:title>prometeiblogimage23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-14.png</image:loc><image:caption>prometeiblogimage14</image:caption><image:title>prometeiblogimage14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-5.png</image:loc><image:caption>prometeiblogimage5</image:caption><image:title>prometeiblogimage5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-20.png</image:loc><image:caption>prometeiblogimage20</image:caption><image:title>prometeiblogimage20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-25.png</image:loc><image:caption>prometeiblogimage25</image:caption><image:title>prometeiblogimage25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-21.png</image:loc><image:caption>prometeiblogimage21</image:caption><image:title>prometeiblogimage21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-10.png</image:loc><image:caption>prometeiblogimage10</image:caption><image:title>prometeiblogimage10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-2.png</image:loc><image:caption>prometeiblogimage2</image:caption><image:title>prometeiblogimage2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-24.png</image:loc><image:caption>prometeiblogimage24</image:caption><image:title>prometeiblogimage24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-11.png</image:loc><image:caption>prometeiblogimage11</image:caption><image:title>prometeiblogimage11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Lior-R-HS-1.png</image:loc><image:caption>LiorRHS1</image:caption><image:title>LiorRHS1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-1.jpg</image:loc><image:caption>prometeiblogimage1</image:caption><image:title>prometeiblogimage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-16.png</image:loc><image:caption>prometeiblogimage16</image:caption><image:title>prometeiblogimage16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Prometei-botnet-featured-blog-image.png</image:loc><image:caption>Prometeibotnetfeaturedblogimage</image:caption><image:title>Prometeibotnetfeaturedblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-22.png</image:loc><image:caption>prometeiblogimage22</image:caption><image:title>prometeiblogimage22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(6).png</image:loc><image:caption>ThreatAlerttemplate6</image:caption><image:title>ThreatAlerttemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-13.png</image:loc><image:caption>prometeiblogimage13</image:caption><image:title>prometeiblogimage13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-7.png</image:loc><image:caption>prometeiblogimage7</image:caption><image:title>prometeiblogimage7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-3.png</image:loc><image:caption>prometeiblogimage3</image:caption><image:title>prometeiblogimage3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/prometei-blog-image-15.png</image:loc><image:caption>prometeiblogimage15</image:caption><image:title>prometeiblogimage15</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-hackers-vs.-spies-the-stratfor-leaks-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-232-Card.png</image:loc><image:caption>MLEp232Card</image:caption><image:title>MLEp232Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><lastmod>2022-06-13</lastmod></url><url><loc>https://www.cybereason.com/services/ir-services-engagement-retainer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><lastmod>2024-10-04</lastmod></url><url><loc>https://www.cybereason.com/blog/blackberry-qnx-vulnerability-highlights-lurking-issues-with-iot-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(34).png</image:loc><image:caption>blogposttext34</image:caption><image:title>blogposttext34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(7).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews7</image:caption><image:title>CopyofBLOGSOCIALSETNews7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(81).png</image:loc><image:caption>blogposttext81</image:caption><image:title>blogposttext81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/yossi-hs.png</image:loc><image:caption>yossihs</image:caption><image:title>yossihs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-08-18</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-warns-u.s.-companies-about-new-ransomware-threat-from-black-basta-gang</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-a-super-70-company-by-jmp-securities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-07-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-joins-with-mitre-engenuitys-center-for-threat-informed-defense</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12).png</image:loc><image:caption>CybereasonBlogTemplate12</image:caption><image:title>CybereasonBlogTemplate12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-06-02</lastmod></url><url><loc>https://www.cybereason.com/blog/historys-most-notorious-ransomware-gangs-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template-2.png</image:loc><image:caption>CybereasonBlogTemplate2</image:caption><image:title>CybereasonBlogTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware.png</image:loc><image:caption>ransomware</image:caption><image:title>ransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(27).png</image:loc><image:caption>blogposttext27</image:caption><image:title>blogposttext27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-lands-275m-from-mnuchins-new-firm-and-others</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Crunchbase%20logo.png</image:loc><image:caption>Crunchbaselogo</image:caption><image:title>Crunchbaselogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-07-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/facebook-data-leak-social-media-giant-haunted-by-third-party-developers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict-Logo-5.jpg</image:loc><image:caption>VerdictLogo5</image:caption><image:title>VerdictLogo5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-04-26</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-selected-as-sc-magazine-2016-award-finalist</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-26</lastmod></url><url><loc>https://www.cybereason.com/blog/research/.net-malware-dropper</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image8-8.png</image:loc><image:caption>image88</image:caption><image:title>image88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T103718.231.png</image:loc><image:caption>blogposttext20220914T103718231</image:caption><image:title>blogposttext20220914T103718231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-6.png</image:loc><image:caption>image46</image:caption><image:title>image46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Aerial_Road.jpg</image:loc><image:caption>AerialRoad</image:caption><image:title>AerialRoad</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-5.png</image:loc><image:caption>image65</image:caption><image:title>image65</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-4.png</image:loc><image:caption>image174</image:caption><image:title>image174</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image22-1.png</image:loc><image:caption>image221</image:caption><image:title>image221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-3.png</image:loc><image:caption>image183</image:caption><image:title>image183</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-6.png</image:loc><image:caption>image146</image:caption><image:title>image146</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-3.jpg</image:loc><image:caption>image113</image:caption><image:title>image113</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-6.png</image:loc><image:caption>image136</image:caption><image:title>image136</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-2.png</image:loc><image:caption>image212</image:caption><image:title>image212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-6.png</image:loc><image:caption>image76</image:caption><image:title>image76</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-16.png</image:loc><image:caption>image116</image:caption><image:title>image116</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-3.png</image:loc><image:caption>image163</image:caption><image:title>image163</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-5.png</image:loc><image:caption>image125</image:caption><image:title>image125</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-8.png</image:loc><image:caption>image58</image:caption><image:title>image58</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-9.png</image:loc><image:caption>image39</image:caption><image:title>image39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-5.png</image:loc><image:caption>image155</image:caption><image:title>image155</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-3.png</image:loc><image:caption>image203</image:caption><image:title>image203</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-5.png</image:loc><image:caption>image95</image:caption><image:title>image95</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-5.png</image:loc><image:caption>image105</image:caption><image:title>image105</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-2.png</image:loc><image:caption>image242</image:caption><image:title>image242</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-3.png</image:loc><image:caption>image193</image:caption><image:title>image193</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2023-06-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-tools-make-north-koreas-kimsuky-group-more-dangerous</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-3.png</image:loc><image:caption>DarkReadinglogo3</image:caption><image:title>DarkReadinglogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-11-16</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-snap-fraud-getting-rich-by-stealing-from-the-poor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ML-Ep-249-featured.png</image:loc><image:caption>MLEp249featured</image:caption><image:title>MLEp249featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/VictoriaNegus.jpg</image:loc><image:caption>VictoriaNegus</image:caption><image:title>VictoriaNegus</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Woody.webp</image:loc><image:caption>Woody</image:caption><image:title>Woody</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-09-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/google-cloud-joins-forces-with-cybereason-for-xdr-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo-Oct-13-2021-02-39-28-03-AM.png</image:loc><image:caption>ZDNetlogoOct13202102392803AM</image:caption><image:title>ZDNetlogoOct13202102392803AM</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-north-korean-hackers-may-be-playing-hide-and-seek-by-operating-from-inside-india</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/International-Business-Times.png</image:loc><image:caption>InternationalBusinessTimes</image:caption><image:title>InternationalBusinessTimes</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/australias-securities-regulator-says-server-hit-by-cybersecurity-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Intelligent%20CISO%20logo.jpg</image:loc><image:caption>IntelligentCISOlogo</image:caption><image:title>IntelligentCISOlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-02-04</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/mor-iluz</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_20220315_152446.jpg</image:loc><image:caption>IMG20220315152446</image:caption><image:title>IMG20220315152446</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(44).png</image:loc><image:caption>blogposttext44</image:caption><image:title>blogposttext44</image:title></image:image><lastmod>2022-03-15</lastmod></url><url><loc>https://www.cybereason.com/blog/mitre-attck-and-the-art-of-building-better-defenses</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-Jan-09-2023-06-47-00-9221-PM.png</image:loc><image:caption>blogposttextJan0920230647009221PM</image:caption><image:title>blogposttextJan0920230647009221PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T114247.790-1.png</image:loc><image:caption>blogposttext20220913T1142477901</image:caption><image:title>blogposttext20220913T1142477901</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE_ATT&amp;CK_and_the_Art_of_Building_Better_v3_Page_01.jpg</image:loc><image:caption>MITREATTCKandtheArtofBuildingBetterv3Page01</image:caption><image:title>MITREATTCKandtheArtofBuildingBetterv3Page01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(68).png</image:loc><image:caption>blogposttext68</image:caption><image:title>blogposttext68</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-01-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-top-5-cybersecurity-startups-of-2019</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BusinessComputingWorld.jpeg</image:loc><image:caption>BusinessComputingWorld</image:caption><image:title>BusinessComputingWorld</image:title></image:image><lastmod>2019-01-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/salted-hash-rsac-2017-recap</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CSO.png</image:loc><image:caption>CSO</image:caption><image:title>CSO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/memcached-ddos-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Full%20Theater%20View-2.jpg</image:loc><image:caption>FullTheaterView2</image:caption><image:title>FullTheaterView2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><lastmod>2018-03-08</lastmod></url><url><loc>https://www.cybereason.com/press/gartner-positions-cybereason-in-the-leaders-quadrant-of-the-2022-magic-quadrant-for-endpoint-protection-platforms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/resources/data-sheets</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/on-prem-datasheet-cover.png</image:loc><image:caption>onpremdatasheetcover</image:caption><image:title>onpremdatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-edr-datasheet--thumb.jpg</image:loc><image:caption>credrdatasheetthumb</image:caption><image:title>credrdatasheetthumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/breach-simulation-datasheet-cover.png</image:loc><image:caption>breachsimulationdatasheetcover</image:caption><image:title>breachsimulationdatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/consulting-collateral-lg.jpg</image:loc><image:caption>consultingcollaterallg</image:caption><image:title>consultingcollaterallg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/incident-response-services.jpg</image:loc><image:caption>incidentresponseservices</image:caption><image:title>incidentresponseservices</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/resilience-retainer-649.jpg</image:loc><image:caption>resilienceretainer649</image:caption><image:title>resilienceretainer649</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/CR-mobile-theat-defense-thumb-cover.jpg</image:loc><image:caption>CRmobiletheatdefensethumbcover</image:caption><image:title>CRmobiletheatdefensethumbcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pixel-tracking-security-assessment.jpg</image:loc><image:caption>pixeltrackingsecurityassessment</image:caption><image:title>pixeltrackingsecurityassessment</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cybereason-mdr-service-brief-thumbnail.jpg</image:loc><image:caption>cybereasonmdrservicebriefthumbnail</image:caption><image:title>cybereasonmdrservicebriefthumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/analyst-tabletop-exercise-datasheet-cover.png</image:loc><image:caption>analysttabletopexercisedatasheetcover</image:caption><image:title>analysttabletopexercisedatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/xdr-platform-datasheet-cover.png</image:loc><image:caption>xdrplatformdatasheetcover</image:caption><image:title>xdrplatformdatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-ngav-redefined--v4-thumbnail.jpg</image:loc><image:caption>crngavredefinedv4thumbnail</image:caption><image:title>crngavredefinedv4thumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/google-deployment-xdr-cover.png</image:loc><image:caption>googledeploymentxdrcover</image:caption><image:title>googledeploymentxdrcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/xdr-datasheet-cover-2022.png</image:loc><image:caption>xdrdatasheetcover2022</image:caption><image:title>xdrdatasheetcover2022</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-cyber-posture-assessment-service-brief_Page_1.png</image:loc><image:caption>crcyberpostureassessmentservicebriefPage1</image:caption><image:title>crcyberpostureassessmentservicebriefPage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-endpoint-controls-product-brief--thumb.jpg</image:loc><image:caption>crendpointcontrolsproductbriefthumb</image:caption><image:title>crendpointcontrolsproductbriefthumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vulnerability-management-cybereason.jpg</image:loc><image:caption>vulnerabilitymanagementcybereason</image:caption><image:title>vulnerabilitymanagementcybereason</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2025-09-08</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-new-pay-as-you-grow-program-designed-to-nurture-managed-security-services-provider-partners</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-01-18</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-named-to-10-hottest-xdr-companies-to-watch-list-for-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(17).png</image:loc><image:caption>blogposttext17</image:caption><image:title>blogposttext17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(38)-1.png</image:loc><image:caption>CybereasonBlogTemplate381</image:caption><image:title>CybereasonBlogTemplate381</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(32)-1.png</image:loc><image:caption>CybereasonBlogTemplate321</image:caption><image:title>CybereasonBlogTemplate321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-hell-to-pay-ransomware-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel%20barak-1.png</image:loc><image:caption>israelbarak1</image:caption><image:title>israelbarak1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/YossiCropped-1.jpeg</image:loc><image:caption>YossiCropped1</image:caption><image:title>YossiCropped1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Uri%20Sternfeld%20Credit%20Tanya%20Yakovleva.jpeg</image:loc><image:caption>UriSternfeldCreditTanyaYakovleva</image:caption><image:title>UriSternfeldCreditTanyaYakovleva</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Stephen_Cobb.jpeg</image:loc><image:caption>StephenCobb</image:caption><image:title>StephenCobb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20(6).png</image:loc><image:caption>BLOG6</image:caption><image:title>BLOG6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-oracle-join-forces-to-protect-enterprises-from-cybersecurity-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRNtv%20logo-1.png</image:loc><image:caption>CRNtvlogo1</image:caption><image:title>CRNtvlogo1</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/stopping-cyberattacks-will-require-public-private-partnerships-say-experts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cheddar%20logo-2.png</image:loc><image:caption>Cheddarlogo2</image:caption><image:title>Cheddarlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-03-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/massive-breach-shows-how-espionage-is-carried-out-in-the-21st-century</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSN%20logo-3.png</image:loc><image:caption>MSNlogo3</image:caption><image:title>MSNlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/how-to-create-an-effective-ransomware-response-plan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(61).png</image:loc><image:caption>blogposttext61</image:caption><image:title>blogposttext61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(85).png</image:loc><image:caption>blogposttext85</image:caption><image:title>blogposttext85</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085148.693.png</image:loc><image:caption>blogposttext20221018T085148693</image:caption><image:title>blogposttext20221018T085148693</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-03-29</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-deception</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Yonatan%20Striem-Amit.jpg</image:loc><image:caption>YonatanStriemAmit</image:caption><image:title>YonatanStriemAmit</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/14%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>14MALICIOUSLIFE1</image:caption><image:title>14MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/blog/launching-now-cybereason-remote-workforce-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(81).png</image:loc><image:caption>blogposttext81</image:caption><image:title>blogposttext81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Shai.png</image:loc><image:caption>Shai</image:caption><image:title>Shai</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/bg-hero-thankyou-1.jpg</image:loc><image:caption>bgherothankyou1</image:caption><image:title>bgherothankyou1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fifa-hack-what-could-have-prevented-the-second-breach-of-the-year</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict-Logo-2.jpg</image:loc><image:caption>VerdictLogo2</image:caption><image:title>VerdictLogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-11-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomfree-is-the-latest-app-that-tries-to-stop-ransomware-infections-on-windows</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Bleeping-Computer1.png</image:loc><image:caption>BleepingComputer1</image:caption><image:title>BleepingComputer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/the-state-of-ransomware-in-the-manufacturing-sector</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(115).png</image:loc><image:caption>blogposttext115</image:caption><image:title>blogposttext115</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(50).png</image:loc><image:caption>blogposttext50</image:caption><image:title>blogposttext50</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(85).png</image:loc><image:caption>blogposttext85</image:caption><image:title>blogposttext85</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-03-22</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-launches-technology-partner-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/mit-sloan-cio-symposium-selects-finalists-for-2014-innovation-showcase</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/reters.jpg</image:loc><image:caption>reters</image:caption><image:title>reters</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-jerusalem-virus-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/36%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>36MALICIOUSLIFE</image:caption><image:title>36MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-1.png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yuval%20Rakavy.jpeg</image:loc><image:caption>YuvalRakavy</image:caption><image:title>YuvalRakavy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-245-Card.png</image:loc><image:caption>MLEp245Card</image:caption><image:title>MLEp245Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/mass.-firms-find-themselves-on-the-front-line-of-cyberwar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/BostonGlobe.jpg</image:loc><image:caption>BostonGlobe</image:caption><image:title>BostonGlobe</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alert-chaes</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><lastmod>2020-11-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-lands-100m-in-series-d-funding-plans-investments-in-aggressive-go-to-market-push</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CRN-Logo-800x392.png</image:loc><image:caption>CRNLogo800x392</image:caption><image:title>CRNLogo800x392</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/spear-phishing-is-still-around-fight-this-evil</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-1.png</image:loc><image:caption>CybereasonBlogTemplate41</image:caption><image:title>CybereasonBlogTemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(6).png</image:loc><image:caption>ThreatAlerttemplate6</image:caption><image:title>ThreatAlerttemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_317089544-1024x391.jpg</image:loc><image:caption>shutterstock3170895441024x391</image:caption><image:title>shutterstock3170895441024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/top-5-endpoint-detection-and-response-edr-platforms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Untitled-design-3.png</image:loc><image:caption>Untitleddesign3</image:caption><image:title>Untitleddesign3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/join-us-for-defendercon-2021</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(35).png</image:loc><image:caption>blogposttext35</image:caption><image:title>blogposttext35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(12).png</image:loc><image:caption>blogposttext12</image:caption><image:title>blogposttext12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Defendercon_LP_no%20time.jpg</image:loc><image:caption>1200x627DefenderconLPnotime</image:caption><image:title>1200x627DefenderconLPnotime</image:title></image:image><lastmod>2021-12-01</lastmod></url><url><loc>https://www.cybereason.com/blog/solarwinds-attacks-highlight-advantage-of-indicators-of-behavior-for-early-detection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/solarwinds-update-blog-card.png</image:loc><image:caption>solarwindsupdateblogcard</image:caption><image:title>solarwindsupdateblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(7).png</image:loc><image:caption>Vs7</image:caption><image:title>Vs7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-names-shai-horovitz-its-chief-revenue-officer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-05-31</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-declares-war-on-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/finding-our-brand-voice-champions-for-the-defender</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/meg-oleary-600px.jpg</image:loc><image:caption>megoleary600px</image:caption><image:title>megoleary600px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/owls-group.png</image:loc><image:caption>owlsgroup</image:caption><image:title>owlsgroup</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(65).png</image:loc><image:caption>blogposttext65</image:caption><image:title>blogposttext65</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/threat-alert-molerats-pierogis</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Partner-Page-Icons-03.png</image:loc><image:caption>PartnerPageIcons03</image:caption><image:title>PartnerPageIcons03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-threat-type.png</image:loc><image:caption>criconthreattype</image:caption><image:title>criconthreattype</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/icons-all/Asset%203.png</image:loc><image:caption>Asset3</image:caption><image:title>Asset3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-impacted-geo.png</image:loc><image:caption>criconimpactedgeo</image:caption><image:title>criconimpactedgeo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-remediate-disable.png</image:loc><image:caption>criconremediatedisable</image:caption><image:title>criconremediatedisable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-block-executable.png</image:loc><image:caption>criconblockexecutable</image:caption><image:title>criconblockexecutable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-hero-bg.jpg</image:loc><image:caption>threatalertherobg</image:caption><image:title>threatalertherobg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-attack-goal.png</image:loc><image:caption>criconattackgoal</image:caption><image:title>criconattackgoal</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/edr-buyers-guide-microsoft</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-wing.png</image:loc><image:caption>crbgherobluesubtlewithwing</image:caption><image:title>crbgherobluesubtlewithwing</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/microsoft-buyers-guide-cover.png</image:loc><image:caption>microsoftbuyersguidecover</image:caption><image:title>microsoftbuyersguidecover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><lastmod>2021-10-21</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-operation-snow-white-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7).png</image:loc><image:caption>MaliciousLifeepisode7</image:caption><image:title>MaliciousLifeepisode7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-252-featured.png</image:loc><image:caption>MLEp252featured</image:caption><image:title>MLEp252featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Tony_Ortega.jpg</image:loc><image:caption>TonyOrtega</image:caption><image:title>TonyOrtega</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(3).png</image:loc><image:caption>Maliciouslifepodcast3</image:caption><image:title>Maliciouslifepodcast3</image:title></image:image><lastmod>2024-10-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-launches-advanced-ransomware-protection-and-blocking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_381826999-1000x391.jpg</image:loc><image:caption>shutterstock3818269991000x391</image:caption><image:title>shutterstock3818269991000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(7).png</image:loc><image:caption>Vs7</image:caption><image:title>Vs7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/keeping%20up%20with%20ai%20innovation%20blog%20img.png</image:loc><image:caption>keepingupwithaiinnovationblogimg</image:caption><image:title>keepingupwithaiinnovationblogimg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/resources/post-incident-review</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ghostnet-01.png</image:loc><image:caption>ghostnet01</image:caption><image:title>ghostnet01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/indicatorofcompromise-01.png</image:loc><image:caption>indicatorofcompromise01</image:caption><image:title>indicatorofcompromise01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/low-slow-graph.gif</image:loc><image:caption>lowslowgraph</image:caption><image:title>lowslowgraph</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/remediate-01.png</image:loc><image:caption>remediate01</image:caption><image:title>remediate01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/ebook-page-image-1.png</image:loc><image:caption>ebookpageimage1</image:caption><image:title>ebookpageimage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/black.png</image:loc><image:caption>black</image:caption><image:title>black</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/damage-01-01.png</image:loc><image:caption>damage0101</image:caption><image:title>damage0101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cloud-01.png</image:loc><image:caption>cloud01</image:caption><image:title>cloud01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/siem-01.png</image:loc><image:caption>siem01</image:caption><image:title>siem01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shadownet-01.png</image:loc><image:caption>shadownet01</image:caption><image:title>shadownet01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/Dark_Gunmetal.png</image:loc><image:caption>DarkGunmetal</image:caption><image:title>DarkGunmetal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/stuxnet-01.png</image:loc><image:caption>stuxnet01</image:caption><image:title>stuxnet01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(11).png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/resilience-01.png</image:loc><image:caption>resilience01</image:caption><image:title>resilience01</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://www.cybereason.com/press/new-cybereason-subsidiary-empowers-u.s.-government-agencies-to-detect-malicious-operations-faster</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-10-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/nightmare-before-christmas-what-to-know-about-the-log4j-vulnerability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CBS%20News%20logo-3.jpg</image:loc><image:caption>CBSNewslogo3</image:caption><image:title>CBSNewslogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-12-20</lastmod></url><url><loc>https://www.cybereason.com/blog/zero-day-vulnerabilities-vmware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(24).png</image:loc><image:caption>BLOGImagesTemplatev224</image:caption><image:title>BLOGImagesTemplatev224</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_SonicWall.png</image:loc><image:caption>BLOGImagesSonicWall</image:caption><image:title>BLOGImagesSonicWall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(9).png</image:loc><image:caption>BLOGImagesTemplatev29</image:caption><image:title>BLOGImagesTemplatev29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2025-03-05</lastmod></url><url><loc>https://www.cybereason.com/blog/achieve-faster-more-accurate-response-with-cybereason-threat-intelligence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Renaissance.png</image:loc><image:caption>Renaissance</image:caption><image:title>Renaissance</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-cranford-author.png</image:loc><image:caption>jjcranfordauthor</image:caption><image:title>jjcranfordauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Threat%20Intelligence.png</image:loc><image:caption>CybereasonThreatIntelligence</image:caption><image:title>CybereasonThreatIntelligence</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(34).png</image:loc><image:caption>blogposttext34</image:caption><image:title>blogposttext34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-05-16T094933.342.png</image:loc><image:caption>blogposttext20220516T094933342</image:caption><image:title>blogposttext20220516T094933342</image:title></image:image><lastmod>2022-05-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/why-operation-centric-security-returns-the-high-ground-to-the-defenders</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Jan-04-2021-01-54-21-21-AM.png</image:loc><image:caption>SCMagazinelogoJan04202101542121AM</image:caption><image:title>SCMagazinelogoJan04202101542121AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-01-04</lastmod></url><url><loc>https://www.cybereason.com/the-definitive-guide-to-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/definitive-guide-to-xdr-fi.png</image:loc><image:caption>definitiveguidetoxdrfi</image:caption><image:title>definitiveguidetoxdrfi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/xdr-guide-bg.png</image:loc><image:caption>xdrguidebg</image:caption><image:title>xdrguidebg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-12-21</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-continues-its-global-expansion-by-launching-regional-middle-east-operations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/company/newsroom</loc><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Hacker%20News%20logo-2.jpg</image:loc><image:caption>TheHackerNewslogo2</image:caption><image:title>TheHackerNewslogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/built-in-boston-logo-bw.png</image:loc><image:caption>builtinbostonlogobw</image:caption><image:title>builtinbostonlogobw</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-Oct-22-2022-02-44-21-22-AM.png</image:loc><image:caption>DarkReadinglogoOct22202202442122AM</image:caption><image:title>DarkReadinglogoOct22202202442122AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/gartner-peer-insights.png</image:loc><image:caption>gartnerpeerinsights</image:caption><image:title>gartnerpeerinsights</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Post%20MEA-1.png</image:loc><image:caption>ChannelPostMEA1</image:caption><image:title>ChannelPostMEA1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Jul-20-2022-02-24-44-08-AM.png</image:loc><image:caption>SCMagazinelogoJul20202202244408AM</image:caption><image:title>SCMagazinelogoJul20202202244408AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/tahawultech-black-512x512.png</image:loc><image:caption>tahawultechblack512x512</image:caption><image:title>tahawultechblack512x512</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC%20logo-Jun-10-2022-02-43-30-17-AM.png</image:loc><image:caption>CNBClogoJun10202202433017AM</image:caption><image:title>CNBClogoJun10202202433017AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-Sep-01-2022-08-35-04-81-PM.jpg</image:loc><image:caption>SecurityWeeklogoSep01202208350481PM</image:caption><image:title>SecurityWeeklogoSep01202208350481PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-Jun-24-2022-01-44-38-92-PM.png</image:loc><image:caption>ComputerWeeklylogoJun24202201443892PM</image:caption><image:title>ComputerWeeklylogoJun24202201443892PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-Nov-23-2022-02-22-51-4580-PM.jpg</image:loc><image:caption>SecurityWeeklogoNov2320220222514580PM</image:caption><image:title>SecurityWeeklogoNov2320220222514580PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechX%20Media%20logo-1.jpg</image:loc><image:caption>TechXMedialogo1</image:caption><image:title>TechXMedialogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes%20logo-Jan-23-2023-06-23-42-0292-PM.png</image:loc><image:caption>ForbeslogoJan2320230623420292PM</image:caption><image:title>ForbeslogoJan2320230623420292PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Frontier%20Enterprise%20Magazine%20logo.jpg</image:loc><image:caption>FrontierEnterpriseMagazinelogo</image:caption><image:title>FrontierEnterpriseMagazinelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Searchsecurity%20logo-4.jpg</image:loc><image:caption>Searchsecuritylogo4</image:caption><image:title>Searchsecuritylogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-Aug-17-2022-05-01-29-73-PM.png</image:loc><image:caption>DatabreachtodaylogoAug17202205012973PM</image:caption><image:title>DatabreachtodaylogoAug17202205012973PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-Jul-20-2022-02-34-52-48-AM.jpg</image:loc><image:caption>SecurityWeeklogoJul20202202345248AM</image:caption><image:title>SecurityWeeklogoJul20202202345248AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsday%20logo.png</image:loc><image:caption>Newsdaylogo</image:caption><image:title>Newsdaylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Guardian%20logo.png</image:loc><image:caption>TheGuardianlogo</image:caption><image:title>TheGuardianlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-Dec-14-2022-07-19-17-3502-PM.png</image:loc><image:caption>DarkReadinglogoDec1420220719173502PM</image:caption><image:title>DarkReadinglogoDec1420220719173502PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-abstract-black-yellow-logo.jpg</image:loc><image:caption>crbgabstractblackyellowlogo</image:caption><image:title>crbgabstractblackyellowlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo-Jun-10-2022-02-11-06-72-AM.png</image:loc><image:caption>TechRepubliclogoJun10202202110672AM</image:caption><image:title>TechRepubliclogoJun10202202110672AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Health%20IT%20Security%20logo.png</image:loc><image:caption>HealthITSecuritylogo</image:caption><image:title>HealthITSecuritylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/JMP_Securities.png</image:loc><image:caption>JMPSecurities</image:caption><image:title>JMPSecurities</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSN%20logo-Aug-23-2022-11-55-19-24-PM.png</image:loc><image:caption>MSNlogoAug23202211551924PM</image:caption><image:title>MSNlogoAug23202211551924PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Inc%20logo.png</image:loc><image:caption>Inclogo</image:caption><image:title>Inclogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN%20logo-Aug-17-2022-04-28-42-67-PM.png</image:loc><image:caption>CRNlogoAug17202204284267PM</image:caption><image:title>CRNlogoAug17202204284267PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-Jan-11-2023-09-16-29-9984-PM.png</image:loc><image:caption>CSOMagazinelogoJan1120230916299984PM</image:caption><image:title>CSOMagazinelogoJan1120230916299984PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes%20logo-Aug-17-2022-04-51-56-05-PM.png</image:loc><image:caption>ForbeslogoAug17202204515605PM</image:caption><image:title>ForbeslogoAug17202204515605PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Washington%20Times%20logo.png</image:loc><image:caption>WashingtonTimeslogo</image:caption><image:title>WashingtonTimeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CNBC_logo.svg_.png</image:loc><image:caption>CNBClogosvg</image:caption><image:title>CNBClogosvg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/mitre-engenuity-enterprise-badge.svg</image:loc><image:caption>mitreengenuityenterprisebadge</image:caption><image:title>mitreengenuityenterprisebadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CyberSec%20Asia%20logo-3.png</image:loc><image:caption>CyberSecAsialogo3</image:caption><image:title>CyberSecAsialogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Nov-23-2022-03-36-52-1564-PM.png</image:loc><image:caption>BankinfosecuritylogoNov2320220336521564PM</image:caption><image:title>BankinfosecuritylogoNov2320220336521564PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/forbes-billion-dollar-startup.jpg</image:loc><image:caption>forbesbilliondollarstartup</image:caption><image:title>forbesbilliondollarstartup</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eCommerce%20Times%20logo.png</image:loc><image:caption>eCommerceTimeslogo</image:caption><image:title>eCommerceTimeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NSS-Labs-AA-Rating.png</image:loc><image:caption>NSSLabsAARating</image:caption><image:title>NSSLabsAARating</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-Jun-24-2022-01-41-59-50-PM.jpg</image:loc><image:caption>SecurityWeeklogoJun24202201415950PM</image:caption><image:title>SecurityWeeklogoJun24202201415950PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-Aug-17-2022-04-49-35-53-PM.png</image:loc><image:caption>MSSPAlertlogoAug17202204493553PM</image:caption><image:title>MSSPAlertlogoAug17202204493553PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Sep-01-2022-08-38-27-27-PM.png</image:loc><image:caption>SCMagazinelogoSep01202208382727PM</image:caption><image:title>SCMagazinelogoSep01202208382727PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CyberSec%20Asia%20logo-2.png</image:loc><image:caption>CyberSecAsialogo2</image:caption><image:title>CyberSecAsialogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Aug-22-2022-05-50-04-74-PM.png</image:loc><image:caption>InfosecurityMagazinelogoAug22202205500474PM</image:caption><image:title>InfosecurityMagazinelogoAug22202205500474PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-Dec-14-2022-07-22-27-8797-PM.png</image:loc><image:caption>CSOMagazinelogoDec1420220722278797PM</image:caption><image:title>CSOMagazinelogoDec1420220722278797PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-Feb-14-2023-02-40-36-1568-AM.png</image:loc><image:caption>ComputerWeeklylogoFeb1420230240361568AM</image:caption><image:title>ComputerWeeklylogoFeb1420230240361568AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Searchsecurity%20logo-Nov-23-2022-03-33-58-2553-PM.jpg</image:loc><image:caption>SearchsecuritylogoNov2320220333582553PM</image:caption><image:title>SearchsecuritylogoNov2320220333582553PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo-Jan-23-2023-06-46-05-7605-PM.png</image:loc><image:caption>TechRepubliclogoJan2320230646057605PM</image:caption><image:title>TechRepubliclogoJan2320230646057605PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Hacker%20News%20logo-4.jpg</image:loc><image:caption>TheHackerNewslogo4</image:caption><image:title>TheHackerNewslogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Silicon%20Angle%20logo-1.png</image:loc><image:caption>SiliconAnglelogo1</image:caption><image:title>SiliconAnglelogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-Dec-12-2022-05-08-35-2019-PM.png</image:loc><image:caption>DarkReadinglogoDec1220220508352019PM</image:caption><image:title>DarkReadinglogoDec1220220508352019PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Sep-01-2022-08-36-58-28-PM.png</image:loc><image:caption>InfosecurityMagazinelogoSep01202208365828PM</image:caption><image:title>InfosecurityMagazinelogoSep01202208365828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/Brandeis_Zendesk_Logo_01-1-259901-edited.png</image:loc><image:caption>BrandeisZendeskLogo011259901edited</image:caption><image:title>BrandeisZendeskLogo011259901edited</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Silicon%20Angle%20logo-3.png</image:loc><image:caption>SiliconAnglelogo3</image:caption><image:title>SiliconAnglelogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/SC_Magazine_Black_Logo.png</image:loc><image:caption>SCMagazineBlackLogo</image:caption><image:title>SCMagazineBlackLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Straights%20Times%20logo-2.jpg</image:loc><image:caption>TheStraightsTimeslogo2</image:caption><image:title>TheStraightsTimeslogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/battery-ventures-logo.jpg</image:loc><image:caption>batteryventureslogo</image:caption><image:title>batteryventureslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bloomberg%20News%20logo-Dec-12-2022-05-16-24-7281-PM.png</image:loc><image:caption>BloombergNewslogoDec1220220516247281PM</image:caption><image:title>BloombergNewslogoDec1220220516247281PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Searchsecurity%20logo-Dec-14-2022-07-21-01-3220-PM.jpg</image:loc><image:caption>SearchsecuritylogoDec1420220721013220PM</image:caption><image:title>SearchsecuritylogoDec1420220721013220PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20MEA%20logo-2.png</image:loc><image:caption>SecurityMEAlogo2</image:caption><image:title>SecurityMEAlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Approved_Business_2020-Final.png</image:loc><image:caption>ApprovedBusiness2020Final</image:caption><image:title>ApprovedBusiness2020Final</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Hacker%20News%20logo-3.jpg</image:loc><image:caption>TheHackerNewslogo3</image:caption><image:title>TheHackerNewslogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Business%20Times%20logo.png</image:loc><image:caption>TheBusinessTimeslogo</image:caption><image:title>TheBusinessTimeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IT%20Online%20logo.png</image:loc><image:caption>ITOnlinelogo</image:caption><image:title>ITOnlinelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-May-17-2022-02-37-36-75-PM.png</image:loc><image:caption>CSOMagazinelogoMay17202202373675PM</image:caption><image:title>CSOMagazinelogoMay17202202373675PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Feb-14-2023-02-43-47-5518-AM.png</image:loc><image:caption>SCMagazinelogoFeb1420230243475518AM</image:caption><image:title>SCMagazinelogoFeb1420230243475518AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Axios%20logo-1.png</image:loc><image:caption>Axioslogo1</image:caption><image:title>Axioslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cdm-infosec-awards-2019-grayscale.jpg</image:loc><image:caption>cdminfosecawards2019grayscale</image:caption><image:title>cdminfosecawards2019grayscale</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cybersecurity-excellence-award-grayscale.png</image:loc><image:caption>cybersecurityexcellenceawardgrayscale</image:caption><image:title>cybersecurityexcellenceawardgrayscale</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/idc-logo-grayscale.png</image:loc><image:caption>idclogograyscale</image:caption><image:title>idclogograyscale</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Health%20IT%20Security%20logo-1.png</image:loc><image:caption>HealthITSecuritylogo1</image:caption><image:title>HealthITSecuritylogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Dec-12-2022-05-04-22-6506-PM.png</image:loc><image:caption>SCMagazinelogoDec1220220504226506PM</image:caption><image:title>SCMagazinelogoDec1220220504226506PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-Jan-23-2023-06-28-05-8674-PM.png</image:loc><image:caption>MSSPAlertlogoJan2320230628058674PM</image:caption><image:title>MSSPAlertlogoJan2320230628058674PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Press%20Association%20logo.jpg</image:loc><image:caption>PressAssociationlogo</image:caption><image:title>PressAssociationlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Intelligent%20CISO%20logo-4.jpg</image:loc><image:caption>IntelligentCISOlogo4</image:caption><image:title>IntelligentCISOlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Searchsecurity%20logo-Dec-12-2022-04-58-25-7901-PM.jpg</image:loc><image:caption>SearchsecuritylogoDec1220220458257901PM</image:caption><image:title>SearchsecuritylogoDec1220220458257901PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-Jun-10-2022-02-09-16-43-AM.jpg</image:loc><image:caption>SecurityWeeklogoJun10202202091643AM</image:caption><image:title>SecurityWeeklogoJun10202202091643AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bloomberg%20News%20logo-4.png</image:loc><image:caption>BloombergNewslogo4</image:caption><image:title>BloombergNewslogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Beta%20News%20logo-Jan-23-2023-06-29-56-5334-PM.png</image:loc><image:caption>BetaNewslogoJan2320230629565334PM</image:caption><image:title>BetaNewslogoJan2320230629565334PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/boston-globe-2020-top-place-to-work-350px.png</image:loc><image:caption>bostonglobe2020topplacetowork350px</image:caption><image:title>bostonglobe2020topplacetowork350px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Silicon%20Angle%20logo-2.png</image:loc><image:caption>SiliconAnglelogo2</image:caption><image:title>SiliconAnglelogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Dec-12-2022-04-56-23-0107-PM.png</image:loc><image:caption>BankinfosecuritylogoDec1220220456230107PM</image:caption><image:title>BankinfosecuritylogoDec1220220456230107PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CXO%20Middle%20East%20logo-2.jpg</image:loc><image:caption>CXOMiddleEastlogo2</image:caption><image:title>CXOMiddleEastlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSN%20logo-Jan-11-2023-09-42-56-7466-PM.png</image:loc><image:caption>MSNlogoJan1120230942567466PM</image:caption><image:title>MSNlogoJan1120230942567466PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo-Aug-23-2022-11-57-11-12-PM.png</image:loc><image:caption>TechRepubliclogoAug23202211571112PM</image:caption><image:title>TechRepubliclogoAug23202211571112PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Jul-20-2022-02-52-32-99-AM.png</image:loc><image:caption>SCMagazinelogoJul20202202523299AM</image:caption><image:title>SCMagazinelogoJul20202202523299AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Boulevard%20logo-4.png</image:loc><image:caption>SecurityBoulevardlogo4</image:caption><image:title>SecurityBoulevardlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20News%20logo-Aug-22-2022-05-53-03-60-PM.png</image:loc><image:caption>YahooNewslogoAug22202205530360PM</image:caption><image:title>YahooNewslogoAug22202205530360PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Sun%20logo-3.png</image:loc><image:caption>TheSunlogo3</image:caption><image:title>TheSunlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-Feb-07-2023-09-22-08-6809-PM.jpg</image:loc><image:caption>SecurityWeeklogoFeb0720230922086809PM</image:caption><image:title>SecurityWeeklogoFeb0720230922086809PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/mitre-r5-turla-badge.png</image:loc><image:caption>mitrer5turlabadge</image:caption><image:title>mitrer5turlabadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-Aug-17-2022-04-53-41-54-PM.png</image:loc><image:caption>CSOMagazinelogoAug17202204534154PM</image:caption><image:title>CSOMagazinelogoAug17202204534154PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WKTY-TV%20logo.jpg</image:loc><image:caption>WKTYTVlogo</image:caption><image:title>WKTYTVlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20National%20(Middle%20East)%20logo-4.png</image:loc><image:caption>TheNationalMiddleEastlogo4</image:caption><image:title>TheNationalMiddleEastlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-Jul-20-2022-02-41-06-97-AM.png</image:loc><image:caption>DarkReadinglogoJul20202202410697AM</image:caption><image:title>DarkReadinglogoJul20202202410697AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-Jan-23-2023-06-25-37-2101-PM.png</image:loc><image:caption>DatabreachtodaylogoJan2320230625372101PM</image:caption><image:title>DatabreachtodaylogoJan2320230625372101PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/download-1-952536-edited.jpg</image:loc><image:caption>download1952536edited</image:caption><image:title>download1952536edited</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Enterprise%20Channels%20MEA%20logo.png</image:loc><image:caption>EnterpriseChannelsMEAlogo</image:caption><image:title>EnterpriseChannelsMEAlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-Jul-20-2022-02-48-55-31-AM.png</image:loc><image:caption>MSSPAlertlogoJul20202202485531AM</image:caption><image:title>MSSPAlertlogoJul20202202485531AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Beta%20News%20logo-Nov-23-2022-02-21-12-1342-PM.png</image:loc><image:caption>BetaNewslogoNov2320220221121342PM</image:caption><image:title>BetaNewslogoNov2320220221121342PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-Jun-14-2022-01-33-11-66-AM.png</image:loc><image:caption>DatabreachtodaylogoJun14202201331166AM</image:caption><image:title>DatabreachtodaylogoJun14202201331166AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/crn-logo-black.png</image:loc><image:caption>crnlogoblack</image:caption><image:title>crnlogoblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-Jun-10-2022-02-21-13-30-AM.png</image:loc><image:caption>DatabreachtodaylogoJun10202202211330AM</image:caption><image:title>DatabreachtodaylogoJun10202202211330AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20Finance%20logo-2.png</image:loc><image:caption>YahooFinancelogo2</image:caption><image:title>YahooFinancelogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Jun-10-2022-02-07-16-04-AM.png</image:loc><image:caption>SCMagazinelogoJun10202202071604AM</image:caption><image:title>SCMagazinelogoJun10202202071604AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CXO%20Today%20logo.jpg</image:loc><image:caption>CXOTodaylogo</image:caption><image:title>CXOTodaylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Nov-23-2022-03-39-11-3053-PM.png</image:loc><image:caption>SCMagazinelogoNov2320220339113053PM</image:caption><image:title>SCMagazinelogoNov2320220339113053PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Hacker%20News%20logo-1.png</image:loc><image:caption>TheHackerNewslogo1</image:caption><image:title>TheHackerNewslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Singapore%20Business%20Review%20logo-1.jpg</image:loc><image:caption>SingaporeBusinessReviewlogo1</image:caption><image:title>SingaporeBusinessReviewlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Aug-24-2022-12-00-48-90-AM.png</image:loc><image:caption>SCMagazinelogoAug24202212004890AM</image:caption><image:title>SCMagazinelogoAug24202212004890AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Email%20Template%20Images/cr-logo-black-2@2x.png</image:loc><image:caption>crlogoblack22x</image:caption><image:title>crlogoblack22x</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITWeb%20logo-3.png</image:loc><image:caption>ITWeblogo3</image:caption><image:title>ITWeblogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Silicon%20Angle%20logo-Dec-14-2022-07-23-46-3546-PM.png</image:loc><image:caption>SiliconAnglelogoDec1420220723463546PM</image:caption><image:title>SiliconAnglelogoDec1420220723463546PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IPT.Net%20logo.png</image:loc><image:caption>IPTNetlogo</image:caption><image:title>IPTNetlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2020-CRN-Channel-Chiefs-BW.jpg</image:loc><image:caption>2020CRNChannelChiefsBW</image:caption><image:title>2020CRNChannelChiefsBW</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TEISS%20logo-Jun-10-2022-02-26-46-71-AM.png</image:loc><image:caption>TEISSlogoJun10202202264671AM</image:caption><image:title>TEISSlogoJun10202202264671AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Week%20logo-Feb-08-2023-02-44-23-3052-PM.png</image:loc><image:caption>SecurityWeeklogoFeb0820230244233052PM</image:caption><image:title>SecurityWeeklogoFeb0820230244233052PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC_Magazine_Black_Logo.png</image:loc><image:caption>SCMagazineBlackLogo</image:caption><image:title>SCMagazineBlackLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/VentureFizz%20logo.png</image:loc><image:caption>VentureFizzlogo</image:caption><image:title>VentureFizzlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-May-17-2022-02-39-58-47-PM.png</image:loc><image:caption>SCMagazinelogoMay17202202395847PM</image:caption><image:title>SCMagazinelogoMay17202202395847PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cyberwire%20logo.png</image:loc><image:caption>Cyberwirelogo</image:caption><image:title>Cyberwirelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC%20logo-May-17-2022-02-42-36-37-PM.png</image:loc><image:caption>CNBClogoMay17202202423637PM</image:caption><image:title>CNBClogoMay17202202423637PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CXO%20DX%20logo-1.jpg</image:loc><image:caption>CXODXlogo1</image:caption><image:title>CXODXlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BBC%20logo.png</image:loc><image:caption>BBClogo</image:caption><image:title>BBClogo</image:title></image:image><lastmod>2025-03-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/remote-college-creates-fertile-ground-for-internet-mischief</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/marketplace%20radio%20logo.png</image:loc><image:caption>marketplaceradiologo</image:caption><image:title>marketplaceradiologo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-08-25</lastmod></url><url><loc>https://www.cybereason.com/blog/beware-of-the-messengers-exploiting-activemq-vulnerability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-22b.png</image:loc><image:caption>activemqblog22b</image:caption><image:title>activemqblog22b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-12.png</image:loc><image:caption>activemqblog12</image:caption><image:title>activemqblog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-4.jpg</image:loc><image:caption>activemqblog4</image:caption><image:title>activemqblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-14.jpg</image:loc><image:caption>activemqblog14</image:caption><image:title>activemqblog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-24.png</image:loc><image:caption>activemqblog24</image:caption><image:title>activemqblog24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-10.png</image:loc><image:caption>activemqblog10</image:caption><image:title>activemqblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-7.png</image:loc><image:caption>activemqblog7</image:caption><image:title>activemqblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/goot-loader-blog-featured.png</image:loc><image:caption>gootloaderblogfeatured</image:caption><image:title>gootloaderblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-19.png</image:loc><image:caption>activemqblog19</image:caption><image:title>activemqblog19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-1.jpg</image:loc><image:caption>activemqblog1</image:caption><image:title>activemqblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-22.png</image:loc><image:caption>activemqblog22</image:caption><image:title>activemqblog22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-2.png</image:loc><image:caption>activemqblog2</image:caption><image:title>activemqblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-6.png</image:loc><image:caption>activemqblog6</image:caption><image:title>activemqblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-5.png</image:loc><image:caption>activemqblog5</image:caption><image:title>activemqblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-27.png</image:loc><image:caption>activemqblog27</image:caption><image:title>activemqblog27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-18.png</image:loc><image:caption>activemqblog18</image:caption><image:title>activemqblog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-20.jpg</image:loc><image:caption>activemqblog20</image:caption><image:title>activemqblog20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-23.png</image:loc><image:caption>activemqblog23</image:caption><image:title>activemqblog23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-25.png</image:loc><image:caption>activemqblog25</image:caption><image:title>activemqblog25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-28.png</image:loc><image:caption>activemqblog28</image:caption><image:title>activemqblog28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-11.png</image:loc><image:caption>activemqblog11</image:caption><image:title>activemqblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat-Alert-GootLoader-SEO-Poisoning.png</image:loc><image:caption>ThreatAlertGootLoaderSEOPoisoning</image:caption><image:title>ThreatAlertGootLoaderSEOPoisoning</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-21.png</image:loc><image:caption>activemqblog21</image:caption><image:title>activemqblog21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-8.png</image:loc><image:caption>activemqblog8</image:caption><image:title>activemqblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-30.png</image:loc><image:caption>activemqblog30</image:caption><image:title>activemqblog30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-9.png</image:loc><image:caption>activemqblog9</image:caption><image:title>activemqblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-13.png</image:loc><image:caption>activemqblog13</image:caption><image:title>activemqblog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-22c.png</image:loc><image:caption>activemqblog22c</image:caption><image:title>activemqblog22c</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/activemq-blog-featured.png</image:loc><image:caption>activemqblogfeatured</image:caption><image:title>activemqblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/kengwei-hs.jpg</image:loc><image:caption>kengweihs</image:caption><image:title>kengweihs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-3.png</image:loc><image:caption>activemqblog3</image:caption><image:title>activemqblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-29.png</image:loc><image:caption>activemqblog29</image:caption><image:title>activemqblog29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-16.png</image:loc><image:caption>activemqblog16</image:caption><image:title>activemqblog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-15.jpg</image:loc><image:caption>activemqblog15</image:caption><image:title>activemqblog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/activemq-blog-17.png</image:loc><image:caption>activemqblog17</image:caption><image:title>activemqblog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Kotaro-Ogino.jpg</image:loc><image:caption>KotaroOgino</image:caption><image:title>KotaroOgino</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/robin-hs.jpg</image:loc><image:caption>robinhs</image:caption><image:title>robinhs</image:title></image:image><lastmod>2024-03-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-future-of-ai-in-federal-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/gov-matters-url-logos-color.jpg</image:loc><image:caption>govmattersurllogoscolor</image:caption><image:title>govmattersurllogoscolor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/resources/analyst-reports</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/esg-endpoint-security-trends-report-fi.jpg</image:loc><image:caption>esgendpointsecuritytrendsreportfi</image:caption><image:title>esgendpointsecuritytrendsreportfi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/esg-xdr-resources-card-a.png</image:loc><image:caption>esgxdrresourcescarda</image:caption><image:title>esgxdrresourcescarda</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/stars.png</image:loc><image:caption>stars</image:caption><image:title>stars</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IDC-Tech-Spotlight-Banner.png</image:loc><image:caption>IDCTechSpotlightBanner</image:caption><image:title>IDCTechSpotlightBanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-01-12</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-state-of-credit-card-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/121%20-%20MALICIOUS%20LIFE%20(1).png</image:loc><image:caption>121MALICIOUSLIFE1</image:caption><image:title>121MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(5)-1.png</image:loc><image:caption>pastedimage051</image:caption><image:title>pastedimage051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/138%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>138MALICIOUSLIFE</image:caption><image:title>138MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/researchers-find-vaccine-for-global-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/dark_reading1.jpg</image:loc><image:caption>darkreading1</image:caption><image:title>darkreading1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/an-explanation-of-fileless-malware-with-clear-examples-from-nocturnus-research</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/fileless-malware.jpg</image:loc><image:caption>filelessmalware</image:caption><image:title>filelessmalware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-signs-oem-agreement-with-opswat-to-leverage-metadefender-threat-intelligence-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/own-an-ip-camera-use-this-online-tool-to-learn-if-its-vulnerable-to-two-zero-day-exploits</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Check-If-Your-Camera-is-Vulnerable-1.png</image:loc><image:caption>CheckIfYourCameraisVulnerable1</image:caption><image:title>CheckIfYourCameraisVulnerable1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_399828373.jpg</image:loc><image:caption>shutterstock399828373</image:caption><image:title>shutterstock399828373</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/everything-cybereason-at-the-black-hat-2021-virtual-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SOCIAL-Jul-21-2021-08-33-59-27-PM.png</image:loc><image:caption>SOCIALJul21202108335927PM</image:caption><image:title>SOCIALJul21202108335927PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(105)-1.png</image:loc><image:caption>blogposttext1051</image:caption><image:title>blogposttext1051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Thumbnails_SONOS-1.png</image:loc><image:caption>ThumbnailsSONOS1</image:caption><image:title>ThumbnailsSONOS1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(107).png</image:loc><image:caption>blogposttext107</image:caption><image:title>blogposttext107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/is-training-the-missing-link-in-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/TechBeacon.png</image:loc><image:caption>TechBeacon</image:caption><image:title>TechBeacon</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/threat-alert-covid-19-themed-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-block-executable.png</image:loc><image:caption>criconblockexecutable</image:caption><image:title>criconblockexecutable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-threat-type.png</image:loc><image:caption>criconthreattype</image:caption><image:title>criconthreattype</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-impacted-geo.png</image:loc><image:caption>criconimpactedgeo</image:caption><image:title>criconimpactedgeo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/YELLOW_THREAT_ALERT_CR_ICONS-53.svg</image:loc><image:caption>YELLOWTHREATALERTCRICONS53</image:caption><image:title>YELLOWTHREATALERTCRICONS53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner-Page-Icons-03.png</image:loc><image:caption>PartnerPageIcons03</image:caption><image:title>PartnerPageIcons03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-hero-bg.jpg</image:loc><image:caption>threatalertherobg</image:caption><image:title>threatalertherobg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-attack-goal.png</image:loc><image:caption>criconattackgoal</image:caption><image:title>criconattackgoal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-remediate-disable.png</image:loc><image:caption>criconremediatedisable</image:caption><image:title>criconremediatedisable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/icons-all/Asset%203.png</image:loc><image:caption>Asset3</image:caption><image:title>Asset3</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-yahoos-ugly-death-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/88%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>88MALICIOUSLIFE</image:caption><image:title>88MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uber-reveals-cover-up-of-hack-affecting-57m-riders-drivers-5</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Yahoo!%20News.png</image:loc><image:caption>YahooNews</image:caption><image:title>YahooNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-malicious-life-episode-5-the-roots-of-evil</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-3.jpg</image:loc><image:caption>Untitleddesign3</image:caption><image:title>Untitleddesign3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Eliad%20Kimhy.jpg</image:loc><image:caption>EliadKimhy</image:caption><image:title>EliadKimhy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(3)-1.png</image:loc><image:caption>MaliciousLifeepisode31</image:caption><image:title>MaliciousLifeepisode31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(13).png</image:loc><image:caption>MaliciousLifeepisode13</image:caption><image:title>MaliciousLifeepisode13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2018-01-24</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-bside-hafnium</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(6).png</image:loc><image:caption>Maliciouslifepodcast6</image:caption><image:title>Maliciouslifepodcast6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/103%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>103MALICIOUSLIFE</image:caption><image:title>103MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel%20barak-1.png</image:loc><image:caption>israelbarak1</image:caption><image:title>israelbarak1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-mobile-another-step-towards-our-vision-to-protect-it-all</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Headshot%20(1)-1.jpg</image:loc><image:caption>Headshot11</image:caption><image:title>Headshot11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113218.959.png</image:loc><image:caption>blogposttext20220920T113218959</image:caption><image:title>blogposttext20220920T113218959</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/top-ten-mobile-ucs-hero-B.png</image:loc><image:caption>toptenmobileucsheroB</image:caption><image:title>toptenmobileucsheroB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/threat-alert-chaes-e-commerce-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PARTNER_SANDBOX_CR_ICONS-28.svg</image:loc><image:caption>PARTNERSANDBOXCRICONS28</image:caption><image:title>PARTNERSANDBOXCRICONS28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/TECH_DEEPDIVE_KNOWLEDGE_CR_ICONS-27.svg</image:loc><image:caption>TECHDEEPDIVEKNOWLEDGECRICONS27</image:caption><image:title>TECHDEEPDIVEKNOWLEDGECRICONS27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PLATFORM3_CR_ICONS-03.svg</image:loc><image:caption>PLATFORM3CRICONS03</image:caption><image:title>PLATFORM3CRICONS03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/REDUCE_FALSE_POSITIVES_CR_ICONS-18.svg</image:loc><image:caption>REDUCEFALSEPOSITIVESCRICONS18</image:caption><image:title>REDUCEFALSEPOSITIVESCRICONS18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/BLOCKED_EXECUTABLE_CR_ICONS-32.svg</image:loc><image:caption>BLOCKEDEXECUTABLECRICONS32</image:caption><image:title>BLOCKEDEXECUTABLECRICONS32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines.png</image:loc><image:caption>crbghexagonlines</image:caption><image:title>crbghexagonlines</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/LOGIN_PASSWORDS_CR_ICONS-52.svg</image:loc><image:caption>LOGINPASSWORDSCRICONS52</image:caption><image:title>LOGINPASSWORDSCRICONS52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/IMPACTEDGEO_GLOBE2_CR_ICONS-31.svg</image:loc><image:caption>IMPACTEDGEOGLOBE2CRICONS31</image:caption><image:title>IMPACTEDGEOGLOBE2CRICONS31</image:title></image:image><lastmod>2020-11-18</lastmod></url><url><loc>https://www.cybereason.com/resources/vai-malandra-a-look-into-the-lifecycle-of-brazilian-financial-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-847334548.jpg</image:loc><image:caption>GettyImages847334548</image:caption><image:title>GettyImages847334548</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2019-09-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereasons-cso-sam-currys-analysis-on-solar-winds-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Dec-21-2020-01-33-45-85-AM.png</image:loc><image:caption>BankinfosecuritylogoDec21202001334585AM</image:caption><image:title>BankinfosecuritylogoDec21202001334585AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/industries/government</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/IMPACTEDGEO_GLOBE2_CR_ICONS-31.svg</image:loc><image:caption>IMPACTEDGEOGLOBE2CRICONS31</image:caption><image:title>IMPACTEDGEOGLOBE2CRICONS31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/CIRCLE_CR_ICONS-34.svg</image:loc><image:caption>CIRCLECRICONS34</image:caption><image:title>CIRCLECRICONS34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/STOPS_THREATS_CR_ICONS-50.svg</image:loc><image:caption>STOPSTHREATSCRICONS50</image:caption><image:title>STOPSTHREATSCRICONS50</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILITY_HUNTING_CR_ICONS-13.svg</image:loc><image:caption>VISIBILITYHUNTINGCRICONS13</image:caption><image:title>VISIBILITYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/PLATFORM3_CR_ICONS_MONO-03.png</image:loc><image:caption>PLATFORM3CRICONSMONO03</image:caption><image:title>PLATFORM3CRICONSMONO03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/On-Prem-DS-WhiteBG.png</image:loc><image:caption>OnPremDSWhiteBG</image:caption><image:title>OnPremDSWhiteBG</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-gov-holiday-advisory-11-22-cover.png</image:loc><image:caption>crgovholidayadvisory1122cover</image:caption><image:title>crgovholidayadvisory1122cover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--gov.jpg</image:loc><image:caption>crbgherogov</image:caption><image:title>crbgherogov</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/holiday-ebook-cover-sm.png</image:loc><image:caption>holidayebookcoversm</image:caption><image:title>holidayebookcoversm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/mitre-att&amp;ck-cover.png</image:loc><image:caption>mitreattckcover</image:caption><image:title>mitreattckcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/SEARCH_EASILY_CR_ICONS-17.svg</image:loc><image:caption>SEARCHEASILYCRICONS17</image:caption><image:title>SEARCHEASILYCRICONS17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/XDR-Datasheet-Cover.png</image:loc><image:caption>XDRDatasheetCover</image:caption><image:title>XDRDatasheetCover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/ransomware_e-book-cover.jpg</image:loc><image:caption>ransomwareebookcover</image:caption><image:title>ransomwareebookcover</image:title></image:image><lastmod>2022-05-12</lastmod></url><url><loc>https://www.cybereason.com/blog/remote-work-because-of-a-pandemic-could-give-your-company-a-different-kind-of-virus</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T072637.791.png</image:loc><image:caption>blogposttext20221005T072637791</image:caption><image:title>blogposttext20221005T072637791</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Remote-Virus-Blog-Hero.png</image:loc><image:caption>RemoteVirusBlogHero</image:caption><image:title>RemoteVirusBlogHero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason-Logo-no-text-dark-gray-128x128.png</image:loc><image:caption>CybereasonLogonotextdarkgray128x128</image:caption><image:title>CybereasonLogonotextdarkgray128x128</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(30).png</image:loc><image:caption>blogposttext30</image:caption><image:title>blogposttext30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/is-your-backup-and-recovery-plan-ready</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Datatech%20Vibe%20logo.png</image:loc><image:caption>DatatechVibelogo</image:caption><image:title>DatatechVibelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-04-03</lastmod></url><url><loc>https://www.cybereason.com/blog/6-ways-to-strengthen-your-apt-defense</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(60).png</image:loc><image:caption>blogposttext60</image:caption><image:title>blogposttext60</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/dev/cr-hero-owl-bg.jpg</image:loc><image:caption>crheroowlbg</image:caption><image:title>crheroowlbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-02-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-royal-ransomware-group-evades-detection-with-partial-encryption</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-Dec-14-2022-07-22-27-8797-PM.png</image:loc><image:caption>CSOMagazinelogoDec1420220722278797PM</image:caption><image:title>CSOMagazinelogoDec1420220722278797PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-12-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/evilnum-hacking-group-targets-fintech-firms-with-new-python-based-rat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IDG%20News%20Service.jpg</image:loc><image:caption>IDGNewsService</image:caption><image:title>IDGNewsService</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-09-29</lastmod></url><url><loc>https://www.cybereason.com/blog/xdr-in-2023-cybersecuritys-knight-or-another-castle-in-the-cloud</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cybereason-sdr-evolution-blog-featured-2.png</image:loc><image:caption>cybereasonsdrevolutionblogfeatured2</image:caption><image:title>cybereasonsdrevolutionblogfeatured2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eric-sun-hs.jpg</image:loc><image:caption>ericsunhs</image:caption><image:title>ericsunhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xdr-castle-sky-blog.png</image:loc><image:caption>xdrcastleskyblog</image:caption><image:title>xdrcastleskyblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(74).png</image:loc><image:caption>blogposttext74</image:caption><image:title>blogposttext74</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-06-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/celebrities-data-dumped-on-darknet-site-after-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Govinfosecurity.com%20logo-4.jpg</image:loc><image:caption>Govinfosecuritycomlogo4</image:caption><image:title>Govinfosecuritycomlogo4</image:title></image:image><lastmod>2021-11-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/whatsapp-zero-day-in-spy-revelations-patch-issued</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-11.png</image:loc><image:caption>SCMagazine11</image:caption><image:title>SCMagazine11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/blog/os-x-pirrit-targetingedge-unmasked</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Untitled-design-2.jpg</image:loc><image:caption>Untitleddesign2</image:caption><image:title>Untitleddesign2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSI%20Masquerading%20as%20a%20Malicious%20Software%20Installer%20blog.png</image:loc><image:caption>MSIMasqueradingasaMaliciousSoftwareInstallerblog</image:caption><image:title>MSIMasqueradingasaMaliciousSoftwareInstallerblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/linkedinprofile.png</image:loc><image:caption>linkedinprofile</image:caption><image:title>linkedinprofile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/code-1.png</image:loc><image:caption>code1</image:caption><image:title>code1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/bigboxcode.png</image:loc><image:caption>bigboxcode</image:caption><image:title>bigboxcode</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/targetededge.png</image:loc><image:caption>targetededge</image:caption><image:title>targetededge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-02-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/group-test-review-cybereason-detection-response-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/research/triple-threat-emotet-deploys-trickbot-to-steal-data-spread-ryuk-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-15.png</image:loc><image:caption>triplethreatblog15</image:caption><image:title>triplethreatblog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-39.png</image:loc><image:caption>triplethreatblog39</image:caption><image:title>triplethreatblog39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-66.png</image:loc><image:caption>triplethreatblog66</image:caption><image:title>triplethreatblog66</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-69.png</image:loc><image:caption>triplethreatblog69</image:caption><image:title>triplethreatblog69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-68.png</image:loc><image:caption>triplethreatblog68</image:caption><image:title>triplethreatblog68</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-10.png</image:loc><image:caption>triplethreatblog10</image:caption><image:title>triplethreatblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-22.png</image:loc><image:caption>triplethreatblog22</image:caption><image:title>triplethreatblog22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-43.png</image:loc><image:caption>triplethreatblog43</image:caption><image:title>triplethreatblog43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-33.png</image:loc><image:caption>triplethreatblog33</image:caption><image:title>triplethreatblog33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-34.png</image:loc><image:caption>triplethreatblog34</image:caption><image:title>triplethreatblog34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-41.png</image:loc><image:caption>triplethreatblog41</image:caption><image:title>triplethreatblog41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-59.png</image:loc><image:caption>triplethreatblog59</image:caption><image:title>triplethreatblog59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-28.png</image:loc><image:caption>triplethreatblog28</image:caption><image:title>triplethreatblog28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-12.png</image:loc><image:caption>triplethreatblog12</image:caption><image:title>triplethreatblog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-63.png</image:loc><image:caption>triplethreatblog63</image:caption><image:title>triplethreatblog63</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-47.png</image:loc><image:caption>triplethreatblog47</image:caption><image:title>triplethreatblog47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-29.png</image:loc><image:caption>triplethreatblog29</image:caption><image:title>triplethreatblog29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-45.png</image:loc><image:caption>triplethreatblog45</image:caption><image:title>triplethreatblog45</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-24a.png</image:loc><image:caption>triplethreatblog24a</image:caption><image:title>triplethreatblog24a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-24c.png</image:loc><image:caption>triplethreatblog24c</image:caption><image:title>triplethreatblog24c</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-38.png</image:loc><image:caption>triplethreatblog38</image:caption><image:title>triplethreatblog38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-24b.png</image:loc><image:caption>triplethreatblog24b</image:caption><image:title>triplethreatblog24b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-46.png</image:loc><image:caption>triplethreatblog46</image:caption><image:title>triplethreatblog46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-67.png</image:loc><image:caption>triplethreatblog67</image:caption><image:title>triplethreatblog67</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-37.png</image:loc><image:caption>triplethreatblog37</image:caption><image:title>triplethreatblog37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-61.png</image:loc><image:caption>triplethreatblog61</image:caption><image:title>triplethreatblog61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-6.png</image:loc><image:caption>triplethreatblog6</image:caption><image:title>triplethreatblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-18.png</image:loc><image:caption>triplethreatblog18</image:caption><image:title>triplethreatblog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-19.png</image:loc><image:caption>triplethreatblog19</image:caption><image:title>triplethreatblog19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-31.png</image:loc><image:caption>triplethreatblog31</image:caption><image:title>triplethreatblog31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-58.png</image:loc><image:caption>triplethreatblog58</image:caption><image:title>triplethreatblog58</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-20.png</image:loc><image:caption>triplethreatblog20</image:caption><image:title>triplethreatblog20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-57.png</image:loc><image:caption>triplethreatblog57</image:caption><image:title>triplethreatblog57</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-5.png</image:loc><image:caption>triplethreatblog5</image:caption><image:title>triplethreatblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-1.png</image:loc><image:caption>triplethreatblog1</image:caption><image:title>triplethreatblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-70.png</image:loc><image:caption>triplethreatblog70</image:caption><image:title>triplethreatblog70</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-13.png</image:loc><image:caption>triplethreatblog13</image:caption><image:title>triplethreatblog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-27.png</image:loc><image:caption>triplethreatblog27</image:caption><image:title>triplethreatblog27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-7.png</image:loc><image:caption>triplethreatblog7</image:caption><image:title>triplethreatblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-71.png</image:loc><image:caption>triplethreatblog71</image:caption><image:title>triplethreatblog71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-11.png</image:loc><image:caption>triplethreatblog11</image:caption><image:title>triplethreatblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-8.png</image:loc><image:caption>triplethreatblog8</image:caption><image:title>triplethreatblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-25.png</image:loc><image:caption>triplethreatblog25</image:caption><image:title>triplethreatblog25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-54.png</image:loc><image:caption>triplethreatblog54</image:caption><image:title>triplethreatblog54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-60.png</image:loc><image:caption>triplethreatblog60</image:caption><image:title>triplethreatblog60</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-56.png</image:loc><image:caption>triplethreatblog56</image:caption><image:title>triplethreatblog56</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-53.png</image:loc><image:caption>triplethreatblog53</image:caption><image:title>triplethreatblog53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-50.png</image:loc><image:caption>triplethreatblog50</image:caption><image:title>triplethreatblog50</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/workflow.png</image:loc><image:caption>workflow</image:caption><image:title>workflow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-52.png</image:loc><image:caption>triplethreatblog52</image:caption><image:title>triplethreatblog52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-40.png</image:loc><image:caption>triplethreatblog40</image:caption><image:title>triplethreatblog40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-55.png</image:loc><image:caption>triplethreatblog55</image:caption><image:title>triplethreatblog55</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-51.png</image:loc><image:caption>triplethreatblog51</image:caption><image:title>triplethreatblog51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-32.png</image:loc><image:caption>triplethreatblog32</image:caption><image:title>triplethreatblog32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-65.png</image:loc><image:caption>triplethreatblog65</image:caption><image:title>triplethreatblog65</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-62.png</image:loc><image:caption>triplethreatblog62</image:caption><image:title>triplethreatblog62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(5).png</image:loc><image:caption>ThreatAlerttemplate5</image:caption><image:title>ThreatAlerttemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-64.png</image:loc><image:caption>triplethreatblog64</image:caption><image:title>triplethreatblog64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-24d.png</image:loc><image:caption>triplethreatblog24d</image:caption><image:title>triplethreatblog24d</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-3.png</image:loc><image:caption>triplethreatblog3</image:caption><image:title>triplethreatblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-36.png</image:loc><image:caption>triplethreatblog36</image:caption><image:title>triplethreatblog36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-49.png</image:loc><image:caption>triplethreatblog49</image:caption><image:title>triplethreatblog49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Emotet.png</image:loc><image:caption>Emotet</image:caption><image:title>Emotet</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-14.png</image:loc><image:caption>triplethreatblog14</image:caption><image:title>triplethreatblog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-4.png</image:loc><image:caption>triplethreatblog4</image:caption><image:title>triplethreatblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-48.png</image:loc><image:caption>triplethreatblog48</image:caption><image:title>triplethreatblog48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-44.png</image:loc><image:caption>triplethreatblog44</image:caption><image:title>triplethreatblog44</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-2.png</image:loc><image:caption>triplethreatblog2</image:caption><image:title>triplethreatblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-26.png</image:loc><image:caption>triplethreatblog26</image:caption><image:title>triplethreatblog26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-30.png</image:loc><image:caption>triplethreatblog30</image:caption><image:title>triplethreatblog30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-42.png</image:loc><image:caption>triplethreatblog42</image:caption><image:title>triplethreatblog42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-17.png</image:loc><image:caption>triplethreatblog17</image:caption><image:title>triplethreatblog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-21.png</image:loc><image:caption>triplethreatblog21</image:caption><image:title>triplethreatblog21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-23.png</image:loc><image:caption>triplethreatblog23</image:caption><image:title>triplethreatblog23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-16.png</image:loc><image:caption>triplethreatblog16</image:caption><image:title>triplethreatblog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-35.png</image:loc><image:caption>triplethreatblog35</image:caption><image:title>triplethreatblog35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/triple-threat-blog-9.png</image:loc><image:caption>triplethreatblog9</image:caption><image:title>triplethreatblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-09-29</lastmod></url><url><loc>https://www.cybereason.com/blog/how-to-prevent-ransomware-attacks-at-the-earliest-stages</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(13).png</image:loc><image:caption>blogposttext13</image:caption><image:title>blogposttext13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-27T072602.816.png</image:loc><image:caption>blogposttext20220727T072602816</image:caption><image:title>blogposttext20220727T072602816</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/microsoft-publishes-veiled-mea-culpa-disguised-as-research</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-1.png</image:loc><image:caption>CybereasonBlogTemplate41</image:caption><image:title>CybereasonBlogTemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(3).png</image:loc><image:caption>CybereasonBlogtemplate3</image:caption><image:title>CybereasonBlogtemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(17)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews171</image:caption><image:title>CopyofBLOGSOCIALSETNews171</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-10-26</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-attacks-are-evolving-is-your-soc-ready</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews3</image:caption><image:title>CopyofBLOGSOCIALSETNews3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(75).png</image:loc><image:caption>blogposttext75</image:caption><image:title>blogposttext75</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/operation-cuckoobees-deep-dive-into-stealthy-winnti-techniques</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-May-02-2022-08-50-17-72-PM.png</image:loc><image:caption>CaptureMay02202208501772PM</image:caption><image:title>CaptureMay02202208501772PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Apr-26-2022-06-57-39-38-PM.png</image:loc><image:caption>image3Apr26202206573938PM</image:caption><image:title>image3Apr26202206573938PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Niv%20Yona.png</image:loc><image:caption>NivYona</image:caption><image:title>NivYona</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T113003.246.png</image:loc><image:caption>blogposttext20221003T113003246</image:caption><image:title>blogposttext20221003T113003246</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Apr-26-2022-07-01-24-88-PM.png</image:loc><image:caption>image1Apr26202207012488PM</image:caption><image:title>image1Apr26202207012488PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ofir%20Ozer.png</image:loc><image:caption>OfirOzer</image:caption><image:title>OfirOzer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Akihiro.png</image:loc><image:caption>Akihiro</image:caption><image:title>Akihiro</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(88).png</image:loc><image:caption>blogposttext88</image:caption><image:title>blogposttext88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/assaf%20dahan.png</image:loc><image:caption>assafdahan</image:caption><image:title>assafdahan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Apr-26-2022-06-59-11-65-PM.png</image:loc><image:caption>image5Apr26202206591165PM</image:caption><image:title>image5Apr26202206591165PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Apr-26-2022-07-02-27-16-PM.png</image:loc><image:caption>image6Apr26202207022716PM</image:caption><image:title>image6Apr26202207022716PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chen%20Erlich.png</image:loc><image:caption>ChenErlich</image:caption><image:title>ChenErlich</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DANIEL%20FRANK.png</image:loc><image:caption>DANIELFRANK</image:caption><image:title>DANIELFRANK</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/profile-pics.png</image:loc><image:caption>profilepics</image:caption><image:title>profilepics</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Apr-26-2022-06-58-22-80-PM.png</image:loc><image:caption>image2Apr26202206582280PM</image:caption><image:title>image2Apr26202206582280PM</image:title></image:image><lastmod>2024-08-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-variant-of-ursnif-targeting-japan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Securityweek-logo-1.jpg</image:loc><image:caption>Securityweeklogo1</image:caption><image:title>Securityweeklogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2019-03-13</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-inside-ip/bgp-hijacking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/136%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>136MALICIOUSLIFE</image:caption><image:title>136MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode.png</image:loc><image:caption>MaliciousLifeepisode</image:caption><image:title>MaliciousLifeepisode</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dr%20yuval%20shavit.png</image:loc><image:caption>dryuvalshavit</image:caption><image:title>dryuvalshavit</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(23).png</image:loc><image:caption>MaliciousLifeepisode23</image:caption><image:title>MaliciousLifeepisode23</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/top-5-cybercrimes-to-watch-out-for-in-2023</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSN%20logo-Jan-11-2023-09-42-56-7466-PM.png</image:loc><image:caption>MSNlogoJan1120230942567466PM</image:caption><image:title>MSNlogoJan1120230942567466PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2023-01-11</lastmod></url><url><loc>https://www.cybereason.com/solutions/threat-hunting</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/platform-bg-shape-sm.png</image:loc><image:caption>platformbgshapesm</image:caption><image:title>platformbgshapesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nick-servicesv1.jpg</image:loc><image:caption>nickservicesv1</image:caption><image:title>nickservicesv1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/platform-image.png</image:loc><image:caption>platformimage</image:caption><image:title>platformimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/ABM%20Files%20and%20Images/icon2_360.png</image:loc><image:caption>icon2360</image:caption><image:title>icon2360</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/New%20Hero%20Images/14-full-theater-view.jpg</image:loc><image:caption>14fulltheaterview</image:caption><image:title>14fulltheaterview</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/ABM%20Files%20and%20Images/icon3_360.png</image:loc><image:caption>icon3360</image:caption><image:title>icon3360</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/ABM%20Files%20and%20Images/icon_360.png</image:loc><image:caption>icon360</image:caption><image:title>icon360</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Rockwall_1920x1080-1.jpg</image:loc><image:caption>Rockwall1920x10801</image:caption><image:title>Rockwall1920x10801</image:title></image:image><lastmod>2018-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-triton-a-malware-designed-to-kill-humans-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/67%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>67MALICIOUSLIFE</image:caption><image:title>67MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Andrew%20Ginter.png</image:loc><image:caption>AndrewGinter</image:caption><image:title>AndrewGinter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-inaugural-report-from-the-cyber-defenders-council-on-new-model-for-cyber-deterrence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/stop-the-attackers-offense-dont-do-defense</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>140MALICIOUSLIFE</image:caption><image:title>140MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-01-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/unpatched-systems-at-big-companies-continue-to-fall-to-wannamine-worm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Ars%20Technica-1.png</image:loc><image:caption>ArsTechnica1</image:caption><image:title>ArsTechnica1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2018-09-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinese-hackers-took-trillions-in-intellectual-property-from-about-30-multinational-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CBS%20News%20logo-May-09-2022-02-57-36-14-PM.jpg</image:loc><image:caption>CBSNewslogoMay09202202573614PM</image:caption><image:title>CBSNewslogoMay09202202573614PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-why-did-people-write-viruses-in-the-80s-and-90s</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-246-Card.png</image:loc><image:caption>MLEp246Card</image:caption><image:title>MLEp246Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-245-Card.png</image:loc><image:caption>MLEp245Card</image:caption><image:title>MLEp245Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Mikko-Hypponen.jpeg</image:loc><image:caption>MikkoHypponen</image:caption><image:title>MikkoHypponen</image:title></image:image><lastmod>2024-07-15</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-your-job-is-to-make-cybersecurity-simple</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-Simple-blog.png</image:loc><image:caption>CISOSimpleblog</image:caption><image:title>CISOSimpleblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/steve%20katz%20bio%20photo.png</image:loc><image:caption>stevekatzbiophoto</image:caption><image:title>stevekatzbiophoto</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories.png</image:loc><image:caption>CISOStories</image:caption><image:title>CISOStories</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-09-21</lastmod></url><url><loc>https://www.cybereason.com/blog/kim-jong-un-north-korea-china-nuclear-talks-six-party</loc><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14).png</image:loc><image:caption>CybereasonBlogTemplate14</image:caption><image:title>CybereasonBlogTemplate14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_1015147498.jpg</image:loc><image:caption>shutterstock1015147498</image:caption><image:title>shutterstock1015147498</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-ciso-interview-series-why-considering-a-business-needs-are-a-key-when-conducting-information-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Untitled%20design%20(81).jpg</image:loc><image:caption>Untitleddesign81</image:caption><image:title>Untitleddesign81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(35).png</image:loc><image:caption>blogposttext35</image:caption><image:title>blogposttext35</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/blog/operation-cuckoobees-a-winnti-malware-arsenal-deep-dive</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image46-2.png</image:loc><image:caption>image462</image:caption><image:title>image462</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image25-Apr-26-2022-08-22-27-29-PM.png</image:loc><image:caption>image25Apr26202208222729PM</image:caption><image:title>image25Apr26202208222729PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Apr-26-2022-08-35-14-86-PM.png</image:loc><image:caption>image4Apr26202208351486PM</image:caption><image:title>image4Apr26202208351486PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(67).png</image:loc><image:caption>image67</image:caption><image:title>image67</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image26-Apr-26-2022-08-56-35-33-PM.png</image:loc><image:caption>image26Apr26202208563533PM</image:caption><image:title>image26Apr26202208563533PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Niv%20Yona.png</image:loc><image:caption>NivYona</image:caption><image:title>NivYona</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-Apr-26-2022-08-53-06-27-PM.png</image:loc><image:caption>image21Apr26202208530627PM</image:caption><image:title>image21Apr26202208530627PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/assaf%20dahan.png</image:loc><image:caption>assafdahan</image:caption><image:title>assafdahan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Apr-26-2022-08-39-51-31-PM.png</image:loc><image:caption>image6Apr26202208395131PM</image:caption><image:title>image6Apr26202208395131PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-Apr-26-2022-08-41-21-24-PM.png</image:loc><image:caption>image18Apr26202208412124PM</image:caption><image:title>image18Apr26202208412124PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Apr-26-2022-08-29-02-84-PM.png</image:loc><image:caption>image7Apr26202208290284PM</image:caption><image:title>image7Apr26202208290284PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image36-Apr-26-2022-08-47-35-18-PM.png</image:loc><image:caption>image36Apr26202208473518PM</image:caption><image:title>image36Apr26202208473518PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/profile-pics.png</image:loc><image:caption>profilepics</image:caption><image:title>profilepics</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Apr-26-2022-08-17-34-41-PM.png</image:loc><image:caption>image10Apr26202208173441PM</image:caption><image:title>image10Apr26202208173441PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>BLOGSOCIALSETNews11</image:caption><image:title>BLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-Apr-26-2022-08-16-47-67-PM.png</image:loc><image:caption>image20Apr26202208164767PM</image:caption><image:title>image20Apr26202208164767PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-Apr-26-2022-08-55-51-86-PM.png</image:loc><image:caption>image23Apr26202208555186PM</image:caption><image:title>image23Apr26202208555186PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ofir%20Ozer.png</image:loc><image:caption>OfirOzer</image:caption><image:title>OfirOzer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Apr-26-2022-08-19-42-68-PM.png</image:loc><image:caption>image5Apr26202208194268PM</image:caption><image:title>image5Apr26202208194268PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image30-Apr-26-2022-08-26-35-37-PM.png</image:loc><image:caption>image30Apr26202208263537PM</image:caption><image:title>image30Apr26202208263537PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image45-2.png</image:loc><image:caption>image452</image:caption><image:title>image452</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image43-3.png</image:loc><image:caption>image433</image:caption><image:title>image433</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(88).png</image:loc><image:caption>blogposttext88</image:caption><image:title>blogposttext88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Apr-26-2022-08-25-44-50-PM.png</image:loc><image:caption>image14Apr26202208254450PM</image:caption><image:title>image14Apr26202208254450PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-Apr-26-2022-08-31-57-00-PM.png</image:loc><image:caption>image24Apr26202208315700PM</image:caption><image:title>image24Apr26202208315700PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Apr-26-2022-08-36-46-90-PM.png</image:loc><image:caption>image2Apr26202208364690PM</image:caption><image:title>image2Apr26202208364690PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Apr-26-2022-08-42-20-49-PM.png</image:loc><image:caption>image8Apr26202208422049PM</image:caption><image:title>image8Apr26202208422049PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chen%20Erlich.png</image:loc><image:caption>ChenErlich</image:caption><image:title>ChenErlich</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27-Apr-26-2022-08-52-01-04-PM.png</image:loc><image:caption>image27Apr26202208520104PM</image:caption><image:title>image27Apr26202208520104PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image35-Apr-26-2022-08-23-37-43-PM.png</image:loc><image:caption>image35Apr26202208233743PM</image:caption><image:title>image35Apr26202208233743PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image44-2.png</image:loc><image:caption>image442</image:caption><image:title>image442</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DANIEL%20FRANK.png</image:loc><image:caption>DANIELFRANK</image:caption><image:title>DANIELFRANK</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image37-3.png</image:loc><image:caption>image373</image:caption><image:title>image373</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Apr-26-2022-08-44-59-40-PM.png</image:loc><image:caption>image15Apr26202208445940PM</image:caption><image:title>image15Apr26202208445940PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Apr-26-2022-08-34-32-88-PM.png</image:loc><image:caption>image1Apr26202208343288PM</image:caption><image:title>image1Apr26202208343288PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Apr-26-2022-08-20-36-62-PM.png</image:loc><image:caption>image12Apr26202208203662PM</image:caption><image:title>image12Apr26202208203662PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Apr-26-2022-08-53-36-34-PM.png</image:loc><image:caption>image11Apr26202208533634PM</image:caption><image:title>image11Apr26202208533634PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image32-Apr-26-2022-08-43-13-74-PM.png</image:loc><image:caption>image32Apr26202208431374PM</image:caption><image:title>image32Apr26202208431374PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image42-2.png</image:loc><image:caption>image422</image:caption><image:title>image422</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image29-Apr-26-2022-08-21-52-25-PM.png</image:loc><image:caption>image29Apr26202208215225PM</image:caption><image:title>image29Apr26202208215225PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image31-Apr-26-2022-08-52-27-83-PM.png</image:loc><image:caption>image31Apr26202208522783PM</image:caption><image:title>image31Apr26202208522783PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image40-3.png</image:loc><image:caption>image403</image:caption><image:title>image403</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image39-2.png</image:loc><image:caption>image392</image:caption><image:title>image392</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image41-3.png</image:loc><image:caption>image413</image:caption><image:title>image413</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image28-Apr-26-2022-08-40-38-18-PM.png</image:loc><image:caption>image28Apr26202208403818PM</image:caption><image:title>image28Apr26202208403818PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-Apr-26-2022-08-48-09-10-PM.png</image:loc><image:caption>image17Apr26202208480910PM</image:caption><image:title>image17Apr26202208480910PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-May-02-2022-07-32-25-54-PM.png</image:loc><image:caption>image13May02202207322554PM</image:caption><image:title>image13May02202207322554PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image47-2.png</image:loc><image:caption>image472</image:caption><image:title>image472</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-Apr-26-2022-09-01-53-69-PM.png</image:loc><image:caption>image19Apr26202209015369PM</image:caption><image:title>image19Apr26202209015369PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image34-Apr-26-2022-08-38-12-18-PM.png</image:loc><image:caption>image34Apr26202208381218PM</image:caption><image:title>image34Apr26202208381218PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image22-Apr-26-2022-08-37-25-41-PM.png</image:loc><image:caption>image22Apr26202208372541PM</image:caption><image:title>image22Apr26202208372541PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Apr-26-2022-08-57-34-53-PM.png</image:loc><image:caption>image3Apr26202208573453PM</image:caption><image:title>image3Apr26202208573453PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image33-Apr-26-2022-08-24-55-80-PM.png</image:loc><image:caption>image33Apr26202208245580PM</image:caption><image:title>image33Apr26202208245580PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Akihiro.png</image:loc><image:caption>Akihiro</image:caption><image:title>Akihiro</image:title></image:image><lastmod>2024-08-12</lastmod></url><url><loc>https://www.cybereason.com/privacy-notice</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2025-04-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cisos-prioritize-budgets-and-product-spending</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-insights-for-2023-from-sam-curry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-Feb-07-2023-09-22-08-6809-PM.jpg</image:loc><image:caption>SecurityWeeklogoFeb0720230922086809PM</image:caption><image:title>SecurityWeeklogoFeb0720230922086809PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2023-02-07</lastmod></url><url><loc>https://www.cybereason.com/platform/endpoint-prevention</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-cityscape-low-opac-01.jpg</image:loc><image:caption>crbgcityscapelowopac01</image:caption><image:title>crbgcityscapelowopac01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/DEPLOY_CR_ICONS-07.png</image:loc><image:caption>DEPLOYCRICONS07</image:caption><image:title>DEPLOYCRICONS07</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PROACTIVE_THREATHUNTING_CR_ICONS-25.png</image:loc><image:caption>PROACTIVETHREATHUNTINGCRICONS25</image:caption><image:title>PROACTIVETHREATHUNTINGCRICONS25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-mln-blog-featured--next-generation-antivirus-prevention.png</image:loc><image:caption>crmlnblogfeaturednextgenerationantivirusprevention</image:caption><image:title>crmlnblogfeaturednextgenerationantivirusprevention</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/CR_Malware_Alerts.png</image:loc><image:caption>CRMalwareAlerts</image:caption><image:title>CRMalwareAlerts</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-11T064615.861.png</image:loc><image:caption>blogposttext20221011T064615861</image:caption><image:title>blogposttext20221011T064615861</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-ngav-redefined--v4-thumbnail.jpg</image:loc><image:caption>crngavredefinedv4thumbnail</image:caption><image:title>crngavredefinedv4thumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/AUTONOMOUS_PREVENTION_CR_ICONS-14.svg</image:loc><image:caption>AUTONOMOUSPREVENTIONCRICONS14</image:caption><image:title>AUTONOMOUSPREVENTIONCRICONS14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl--vector-transparent-min.png</image:loc><image:caption>crowlvectortransparentmin</image:caption><image:title>crowlvectortransparentmin</image:title></image:image><lastmod>2024-05-21</lastmod></url><url><loc>https://www.cybereason.com/blog/code-integrity-in-the-kernel-a-look-into-cidll</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ci%20article%20draft-9.png</image:loc><image:caption>ciarticledraft9</image:caption><image:title>ciarticledraft9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ci%20article%20draft.png</image:loc><image:caption>ciarticledraft</image:caption><image:title>ciarticledraft</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ci%20article%20draft-2.png</image:loc><image:caption>ciarticledraft2</image:caption><image:title>ciarticledraft2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kernel-ci.dll-blog-image.png</image:loc><image:caption>kernelcidllblogimage</image:caption><image:title>kernelcidllblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ci%20article%20draft-3.png</image:loc><image:caption>ciarticledraft3</image:caption><image:title>ciarticledraft3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ci%20article%20draft-8.png</image:loc><image:caption>ciarticledraft8</image:caption><image:title>ciarticledraft8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/the%20problem%20with%20kernel%20mode%20anti%20cheat%20software-1.png</image:loc><image:caption>theproblemwithkernelmodeanticheatsoftware1</image:caption><image:title>theproblemwithkernelmodeanticheatsoftware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ci%20article%20draft-5.png</image:loc><image:caption>ciarticledraft5</image:caption><image:title>ciarticledraft5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ci%20article%20draft-6.png</image:loc><image:caption>ciarticledraft6</image:caption><image:title>ciarticledraft6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ci%20article%20draft-7.png</image:loc><image:caption>ciarticledraft7</image:caption><image:title>ciarticledraft7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ci%20article%20draft-1.png</image:loc><image:caption>ciarticledraft1</image:caption><image:title>ciarticledraft1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ci%20article%20draft-10.png</image:loc><image:caption>ciarticledraft10</image:caption><image:title>ciarticledraft10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-deep-fakes-part-2-man-vs.-machine</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/66%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>66MALICIOUSLIFE</image:caption><image:title>66MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1516245112304.jpeg</image:loc><image:caption>1516245112304</image:caption><image:title>1516245112304</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jonathan-Saunders.jpg</image:loc><image:caption>JonathanSaunders</image:caption><image:title>JonathanSaunders</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/download-1.jpeg</image:loc><image:caption>download1</image:caption><image:title>download1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/foxtons-group-data-breach-hackers-selling-stolen-data-on-the-dark-web</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TEISS%20logo-3.png</image:loc><image:caption>TEISSlogo3</image:caption><image:title>TEISSlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-02-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/researchers-uncover-new-cyber-espionage-campaign-targeting-middle-eastern-politicians</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Dec-09-2020-05-27-10-75-PM.png</image:loc><image:caption>InfosecurityMagazinelogoDec09202005271075PM</image:caption><image:title>InfosecurityMagazinelogoDec09202005271075PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-12-09</lastmod></url><url><loc>https://www.cybereason.com/blog/whistleblower-accuses-ubiquiti-of-downplaying-major-data-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Ubiquiti-Hero.png</image:loc><image:caption>UbiquitiHero</image:caption><image:title>UbiquitiHero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(2)-3.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews23</image:caption><image:title>CopyofBLOGSOCIALSETNews23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-1.png</image:loc><image:caption>CybereasonBlogTemplate41</image:caption><image:title>CybereasonBlogTemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-07-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-chief-technology-officer-and-co-founder-yonatan-striem-amit-to-speak-at-xcon-2018</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-11-09</lastmod></url><url><loc>https://www.cybereason.com/threat-alert-eventbot</loc><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-block-executable.png</image:loc><image:caption>criconblockexecutable</image:caption><image:title>criconblockexecutable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-remediate-disable.png</image:loc><image:caption>criconremediatedisable</image:caption><image:title>criconremediatedisable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/icons-all/Asset%203.png</image:loc><image:caption>Asset3</image:caption><image:title>Asset3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-threat-type.png</image:loc><image:caption>criconthreattype</image:caption><image:title>criconthreattype</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-hero-bg.jpg</image:loc><image:caption>threatalertherobg</image:caption><image:title>threatalertherobg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner-Page-Icons-03.png</image:loc><image:caption>PartnerPageIcons03</image:caption><image:title>PartnerPageIcons03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-attack-goal.png</image:loc><image:caption>criconattackgoal</image:caption><image:title>criconattackgoal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-impacted-geo.png</image:loc><image:caption>criconimpactedgeo</image:caption><image:title>criconimpactedgeo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/blog/the-ransom-disclosure-act-and-defending-against-complex-ransomops</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-1.png</image:loc><image:caption>CybereasonBlogTemplate201</image:caption><image:title>CybereasonBlogTemplate201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14).png</image:loc><image:caption>CybereasonBlogTemplate14</image:caption><image:title>CybereasonBlogTemplate14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware.png</image:loc><image:caption>ransomware</image:caption><image:title>ransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-12-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-attacks-are-surging.-is-your-cybersecurity-up-to-date</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Inc%20logo.png</image:loc><image:caption>Inclogo</image:caption><image:title>Inclogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2022-06-14</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-morris-worm-pt.-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Gene%20Spafford.jpeg</image:loc><image:caption>GeneSpafford</image:caption><image:title>GeneSpafford</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-242-Card.png</image:loc><image:caption>MLEp242Card</image:caption><image:title>MLEp242Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-244-Card.png</image:loc><image:caption>MLEp244Card</image:caption><image:title>MLEp244Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/24%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>24MALICIOUSLIFE1</image:caption><image:title>24MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-beast-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-16.png</image:loc><image:caption>beastransomwareblog16</image:caption><image:title>beastransomwareblog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/hardbit-threat-analysis-featured.png</image:loc><image:caption>hardbitthreatanalysisfeatured</image:caption><image:title>hardbitthreatanalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-4.jpg</image:loc><image:caption>beastransomwareblog4</image:caption><image:title>beastransomwareblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-7.png</image:loc><image:caption>beastransomwareblog7</image:caption><image:title>beastransomwareblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-20.png</image:loc><image:caption>beastransomwareblog20</image:caption><image:title>beastransomwareblog20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-1.png</image:loc><image:caption>beastransomwareblog1</image:caption><image:title>beastransomwareblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-14.png</image:loc><image:caption>beastransomwareblog14</image:caption><image:title>beastransomwareblog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-2.jpg</image:loc><image:caption>beastransomwareblog2</image:caption><image:title>beastransomwareblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-11.png</image:loc><image:caption>beastransomwareblog11</image:caption><image:title>beastransomwareblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-17.png</image:loc><image:caption>beastransomwareblog17</image:caption><image:title>beastransomwareblog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/mark-tsipershtein-hs.png</image:loc><image:caption>marktsipershteinhs</image:caption><image:title>marktsipershteinhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-12.png</image:loc><image:caption>beastransomwareblog12</image:caption><image:title>beastransomwareblog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(13).png</image:loc><image:caption>BLOGImagesTemplatev213</image:caption><image:title>BLOGImagesTemplatev213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/beast-ransomware-blog-featured.png</image:loc><image:caption>beastransomwareblogfeatured</image:caption><image:title>beastransomwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-8.png</image:loc><image:caption>beastransomwareblog8</image:caption><image:title>beastransomwareblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-15.png</image:loc><image:caption>beastransomwareblog15</image:caption><image:title>beastransomwareblog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-6.png</image:loc><image:caption>beastransomwareblog6</image:caption><image:title>beastransomwareblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-10.png</image:loc><image:caption>beastransomwareblog10</image:caption><image:title>beastransomwareblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-13.png</image:loc><image:caption>beastransomwareblog13</image:caption><image:title>beastransomwareblog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-3.png</image:loc><image:caption>beastransomwareblog3</image:caption><image:title>beastransomwareblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-18.png</image:loc><image:caption>beastransomwareblog18</image:caption><image:title>beastransomwareblog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-19.png</image:loc><image:caption>beastransomwareblog19</image:caption><image:title>beastransomwareblog19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-9.png</image:loc><image:caption>beastransomwareblog9</image:caption><image:title>beastransomwareblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/beast-ransomware-blog-5.jpg</image:loc><image:caption>beastransomwareblog5</image:caption><image:title>beastransomwareblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><lastmod>2024-10-18</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-analysis-report-inside-the-destructive-pysa-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-1.png</image:loc><image:caption>tapysaimage1</image:caption><image:title>tapysaimage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-11.png</image:loc><image:caption>tapysaimage11</image:caption><image:title>tapysaimage11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-10.png</image:loc><image:caption>tapysaimage10</image:caption><image:title>tapysaimage10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(2).png</image:loc><image:caption>BLOGImagesTemplatev22</image:caption><image:title>BLOGImagesTemplatev22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-12.png</image:loc><image:caption>tapysaimage12</image:caption><image:title>tapysaimage12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-7b.png</image:loc><image:caption>tapysaimage7b</image:caption><image:title>tapysaimage7b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-7.png</image:loc><image:caption>tapysaimage7</image:caption><image:title>tapysaimage7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-5.png</image:loc><image:caption>tapysaimage5</image:caption><image:title>tapysaimage5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(5).png</image:loc><image:caption>ThreatAlerttemplate5</image:caption><image:title>ThreatAlerttemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-3.png</image:loc><image:caption>tapysaimage3</image:caption><image:title>tapysaimage3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-8.jpg</image:loc><image:caption>tapysaimage8</image:caption><image:title>tapysaimage8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-53-53-18-PM.png</image:loc><image:caption>unnamedSep14202108535318PM</image:caption><image:title>unnamedSep14202108535318PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-4.png</image:loc><image:caption>tapysaimage4</image:caption><image:title>tapysaimage4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-2.png</image:loc><image:caption>tapysaimage2</image:caption><image:title>tapysaimage2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(1).png</image:loc><image:caption>ThreatAlerttemplate1</image:caption><image:title>ThreatAlerttemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-9.jpg</image:loc><image:caption>tapysaimage9</image:caption><image:title>tapysaimage9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ta-pysa-image-6.png</image:loc><image:caption>tapysaimage6</image:caption><image:title>tapysaimage6</image:title></image:image><lastmod>2022-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-doing-privacy-right-vs.-doing-privacy-rights</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-2.png</image:loc><image:caption>CISOStoriestemplate42</image:caption><image:title>CISOStoriestemplate42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/valerie-lyons.png</image:loc><image:caption>valerielyons</image:caption><image:title>valerielyons</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-Privacy-blog.png</image:loc><image:caption>CISOPrivacyblog</image:caption><image:title>CISOPrivacyblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO_51.png</image:loc><image:caption>CISO51</image:caption><image:title>CISO51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><lastmod>2021-09-21</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-visionary-in-2021-gartner-magic-quadrant-for-endpoint-protection-platforms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-05-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-launches-new-pay-as-you-grow-program-for-mssps</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Buzz%20logo-3.jpg</image:loc><image:caption>ChannelBuzzlogo3</image:caption><image:title>ChannelBuzzlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-protecting-data-under-the-gdpr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8481.png</image:loc><image:caption>IMG8481</image:caption><image:title>IMG8481</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/GDPR-banner-1.png</image:loc><image:caption>GDPRbanner1</image:caption><image:title>GDPRbanner1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T083517.794.png</image:loc><image:caption>blogposttext20220907T083517794</image:caption><image:title>blogposttext20220907T083517794</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-04-05</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-citrixbleed-cve-2023-4966</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-inc-ransomware-featured-image.png</image:loc><image:caption>threatalertincransomwarefeaturedimage</image:caption><image:title>threatalertincransomwarefeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/hema-hs.png</image:loc><image:caption>hemahs</image:caption><image:title>hemahs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ivanti-threat-alert-blog-featured.png</image:loc><image:caption>ivantithreatalertblogfeatured</image:caption><image:title>ivantithreatalertblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/citrixbleed-featured-image.png</image:loc><image:caption>citrixbleedfeaturedimage</image:caption><image:title>citrixbleedfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/scott-hs.png</image:loc><image:caption>scotths</image:caption><image:title>scotths</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/citrixbleed-exploitation-pattern.png</image:loc><image:caption>citrixbleedexploitationpattern</image:caption><image:title>citrixbleedexploitationpattern</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2024-01-25</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-named-by-built-in-boston-as-a-company-to-watch-in-2017</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/best-tips-to-keep-your-windows-10-pc-protected-against-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/windows_central_logo.png</image:loc><image:caption>windowscentrallogo</image:caption><image:title>windowscentrallogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2018-03-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/interview-supercharged-by-softbank-cybereason-plans-aggressive-ramp-up-for-2018</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ctech.png</image:loc><image:caption>ctech</image:caption><image:title>ctech</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/wannacry-notpetya-ransomware-attacks-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Insights/Webinars/wannacry-webinar-1.png</image:loc><image:caption>wannacrywebinar1</image:caption><image:title>wannacrywebinar1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-11T064615.861.png</image:loc><image:caption>blogposttext20221011T064615861</image:caption><image:title>blogposttext20221011T064615861</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-20T064817.923.png</image:loc><image:caption>blogposttext20220720T064817923</image:caption><image:title>blogposttext20220720T064817923</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/resources/global-real-estate-company-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/global-real-estate-company-card.png</image:loc><image:caption>globalrealestatecompanycard</image:caption><image:title>globalrealestatecompanycard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-01-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/5-things-you-need-to-do-to-protect-yourself-or-your-business-from-a-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Authority%20Magazine%20logo-1.png</image:loc><image:caption>AuthorityMagazinelogo1</image:caption><image:title>AuthorityMagazinelogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-nocturnus-researchers-go-hunting-for-raccoons-the-new-masked-malware-bandit</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-10-24</lastmod></url><url><loc>https://www.cybereason.com/blog/watch-sam-curry-israel-barak-explain-why-hackers-are-easily-defeating-traditional-security-tools</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Copy-of-1024px-x-391px-%E2%80%93-Untitled-Design-5-1.png</image:loc><image:caption>Copyof1024pxx391pxUntitledDesign51</image:caption><image:title>Copyof1024pxx391pxUntitledDesign51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(7).png</image:loc><image:caption>Vs7</image:caption><image:title>Vs7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/keeping%20up%20with%20ai%20innovation%20blog%20img.png</image:loc><image:caption>keepingupwithaiinnovationblogimg</image:caption><image:title>keepingupwithaiinnovationblogimg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-02-02</lastmod></url><url><loc>https://www.cybereason.com/blog/what-the-yahoo-data-breach-means-for-enterprise-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_194315417.jpg</image:loc><image:caption>shutterstock194315417</image:caption><image:title>shutterstock194315417</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/webinar.png</image:loc><image:caption>webinar</image:caption><image:title>webinar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/resources/cybersecurity-redefined/09102024</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Cybersecurity-Redefined-Banner-09.10.24.png</image:loc><image:caption>CybersecurityRedefinedBanner091024</image:caption><image:title>CybersecurityRedefinedBanner091024</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-09-06</lastmod></url><url><loc>https://www.cybereason.com/blog/ukraine-government-and-embassy-websites-attacked</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ukraine.png</image:loc><image:caption>ukraine</image:caption><image:title>ukraine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T074703.175.png</image:loc><image:caption>blogposttext20220627T074703175</image:caption><image:title>blogposttext20220627T074703175</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(6).png</image:loc><image:caption>ImagefromiOS6</image:caption><image:title>ImagefromiOS6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ken--2_smaller%20(1).jpg</image:loc><image:caption>Ken2smaller1</image:caption><image:title>Ken2smaller1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/blog/ai/ml-powered-automation-the-future-of-cybersecurity-at-scale</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(2)-1.png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T070701.315.png</image:loc><image:caption>blogposttext20220830T070701315</image:caption><image:title>blogposttext20220830T070701315</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog_automatingR.png</image:loc><image:caption>blogautomatingR</image:caption><image:title>blogautomatingR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-12-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/yahoo-now-says-every-account-impacted-by-2013-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Hollywood-Reporter.png</image:loc><image:caption>HollywoodReporter</image:caption><image:title>HollywoodReporter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-identifies-new-malware-variants-used-in-global-iranian-espionage-campaigns</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-02-01</lastmod></url><url><loc>https://www.cybereason.com/partnerships</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/main-logo-black.png</image:loc><image:caption>mainlogoblack</image:caption><image:title>mainlogoblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Images/logo-sversec.svg</image:loc><image:caption>logosversec</image:caption><image:title>logosversec</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Images/engineering@2x.png</image:loc><image:caption>engineering2x</image:caption><image:title>engineering2x</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Images/deal-registration-@2x.png</image:loc><image:caption>dealregistration2x</image:caption><image:title>dealregistration2x</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Images/logo-KLX.svg</image:loc><image:caption>logoKLX</image:caption><image:title>logoKLX</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Images/logo-security7.svg</image:loc><image:caption>logosecurity7</image:caption><image:title>logosecurity7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/png.icons8.png</image:loc><image:caption>pngicons8</image:caption><image:title>pngicons8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Images/marketing-support-@2x.png</image:loc><image:caption>marketingsupport2x</image:caption><image:title>marketingsupport2x</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partners%20-%20Video.png</image:loc><image:caption>PartnersVideo</image:caption><image:title>PartnersVideo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Images/logo-Pinnacle.svg</image:loc><image:caption>logoPinnacle</image:caption><image:title>logoPinnacle</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Images/hero-partner.jpg</image:loc><image:caption>heropartner</image:caption><image:title>heropartner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Images/bg-dark-concrete.jpg</image:loc><image:caption>bgdarkconcrete</image:caption><image:title>bgdarkconcrete</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Images/sales-enable@2x.png</image:loc><image:caption>salesenable2x</image:caption><image:title>salesenable2x</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Images/logo-Brite.svg</image:loc><image:caption>logoBrite</image:caption><image:title>logoBrite</image:title></image:image><lastmod>2019-07-17</lastmod></url><url><loc>https://www.cybereason.com/blog/new-cybereason-government-subsidiary-empowers-u.s.-agencies-to-detect-malicious-operations-faster</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(74).png</image:loc><image:caption>blogposttext74</image:caption><image:title>blogposttext74</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews11</image:caption><image:title>CopyofBLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-1.png</image:loc><image:caption>blogposttext1</image:caption><image:title>blogposttext1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/post-incident-review-and-the-big-data-problem</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(77).png</image:loc><image:caption>blogposttext77</image:caption><image:title>blogposttext77</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/past-future-blog.jpg</image:loc><image:caption>pastfutureblog</image:caption><image:title>pastfutureblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/resources/10-considerations-for-more-efficient-security-operations/webinar/us/121422</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/SOC-Efficiency-Webinar-12.14.22.png</image:loc><image:caption>SOCEfficiencyWebinar121422</image:caption><image:title>SOCEfficiencyWebinar121422</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-02-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-access-34942-paypal-accounts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes%20logo-Jan-23-2023-06-23-42-0292-PM.png</image:loc><image:caption>ForbeslogoJan2320230623420292PM</image:caption><image:title>ForbeslogoJan2320230623420292PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/solarwinds-attack-fallout-18k-customers-at-risk</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SDX%20Central%20logo-1.png</image:loc><image:caption>SDXCentrallogo1</image:caption><image:title>SDXCentrallogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/resources/cyber-consulting-services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/consulting-collateral-lg.jpg</image:loc><image:caption>consultingcollaterallg</image:caption><image:title>consultingcollaterallg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2025-09-08</lastmod></url><url><loc>https://www.cybereason.com/ebook-ransomware-the-true-cost-to-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Revenue%20Lost%20By%20Region.png</image:loc><image:caption>RevenueLostByRegion</image:caption><image:title>RevenueLostByRegion</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/ransomware-true-cost-to-business-ebook-chart--thumb.jpg</image:loc><image:caption>ransomwaretruecosttobusinessebookchartthumb</image:caption><image:title>ransomwaretruecosttobusinessebookchartthumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Revenue%20Loss%20By%20Industry.png</image:loc><image:caption>RevenueLossByIndustry</image:caption><image:title>RevenueLossByIndustry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/ransomware-true-cost-to-business-ebook--thumb.jpg</image:loc><image:caption>ransomwaretruecosttobusinessebookthumb</image:caption><image:title>ransomwaretruecosttobusinessebookthumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-building-eyes--min.jpg</image:loc><image:caption>crbgbuildingeyesmin</image:caption><image:title>crbgbuildingeyesmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware%20True%20Cost%20To%20Business%20Cover.png</image:loc><image:caption>RansomwareTrueCostToBusinessCover</image:caption><image:title>RansomwareTrueCostToBusinessCover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware%20Layoffs%20by%20Vertical.png</image:loc><image:caption>RansomwareLayoffsbyVertical</image:caption><image:title>RansomwareLayoffsbyVertical</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Top%205%20Ransomware%20Solutions%20Implemented.png</image:loc><image:caption>Top5RansomwareSolutionsImplemented</image:caption><image:title>Top5RansomwareSolutionsImplemented</image:title></image:image><lastmod>2022-04-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ukraine-we-blocked-major-russian-attack-on-judiciary</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/infosecmag-1.jpg</image:loc><image:caption>infosecmag1</image:caption><image:title>infosecmag1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-roundtable-ransomware-attacks-and-the-true-cost-to-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/BryanHurd-390x390.png</image:loc><image:caption>BryanHurd390x390</image:caption><image:title>BryanHurd390x390</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-29T100914.455.png</image:loc><image:caption>blogposttext20220929T100914455</image:caption><image:title>blogposttext20220929T100914455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Todd%20F.jpg</image:loc><image:caption>ToddF</image:caption><image:title>ToddF</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/frank-johnson-largeImage-10-a-3748.jpg</image:loc><image:caption>frankjohnsonlargeImage10a3748</image:caption><image:title>frankjohnsonlargeImage10a3748</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kerissa-varma-100886585-large.jpg</image:loc><image:caption>kerissavarma100886585large</image:caption><image:title>kerissavarma100886585large</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(3)-2.png</image:loc><image:caption>CISOStoriestemplate32</image:caption><image:title>CISOStoriestemplate32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG-2-1.webp</image:loc><image:caption>BLOG21</image:caption><image:title>BLOG21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><lastmod>2021-07-12</lastmod></url><url><loc>https://www.cybereason.com/blog/solarwinds-threat-actors-behind-new-email-attack-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T103718.231.png</image:loc><image:caption>blogposttext20220914T103718231</image:caption><image:title>blogposttext20220914T103718231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lockbit-3-blog-card.png</image:loc><image:caption>lockbit3blogcard</image:caption><image:title>lockbit3blogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(9).png</image:loc><image:caption>CybereasonBlogTemplate9</image:caption><image:title>CybereasonBlogTemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-06-01</lastmod></url><url><loc>https://www.cybereason.com/blog/the-untold-story-of-the-rsa-breach-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/andy_greenberg.jpg</image:loc><image:caption>andygreenberg</image:caption><image:title>andygreenberg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/111%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>111MALICIOUSLIFE</image:caption><image:title>111MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-225-Card.png</image:loc><image:caption>MLEp225Card</image:caption><image:title>MLEp225Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dave%20Castignola.jpg</image:loc><image:caption>DaveCastignola</image:caption><image:title>DaveCastignola</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/privacy-by-design-the-fundamentals-of-data-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/PrivSec%20Report%20logo.png</image:loc><image:caption>PrivSecReportlogo</image:caption><image:title>PrivSecReportlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-09-03</lastmod></url><url><loc>https://www.cybereason.com/blog/security-budgets-are-increasing-but-so-are-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(76).png</image:loc><image:caption>blogposttext76</image:caption><image:title>blogposttext76</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-02T094421.274.png</image:loc><image:caption>blogposttext20220602T094421274</image:caption><image:title>blogposttext20220602T094421274</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(39).png</image:loc><image:caption>blogposttext39</image:caption><image:title>blogposttext39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/delayed-detections-in-mitre-attck-what-do-they-mean-for-a-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Eliad%20Kimhy.jpg</image:loc><image:caption>EliadKimhy</image:caption><image:title>EliadKimhy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/keeping%20up%20with%20ai%20innovation%20blog%20img.png</image:loc><image:caption>keepingupwithaiinnovationblogimg</image:caption><image:title>keepingupwithaiinnovationblogimg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/resolving-securitys-biggest-productivity-killer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T141451.987.png</image:loc><image:caption>blogposttext20220725T141451987</image:caption><image:title>blogposttext20220725T141451987</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Blog-Header_Resolving-Securitys.png</image:loc><image:caption>BlogHeaderResolvingSecuritys</image:caption><image:title>BlogHeaderResolvingSecuritys</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/read-now-CTA.png</image:loc><image:caption>readnowCTA</image:caption><image:title>readnowCTA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-01-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-came-to-win-this-week-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN%20logo-3.png</image:loc><image:caption>CRNlogo3</image:caption><image:title>CRNlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-03-01</lastmod></url><url><loc>https://www.cybereason.com/blog/labs-real-life-scenarios-the-way-to-test-ransomware-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/scenarios_feature.jpg</image:loc><image:caption>scenariosfeature</image:caption><image:title>scenariosfeature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blank-avatar.png</image:loc><image:caption>blankavatar</image:caption><image:title>blankavatar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hack-of-computers-in-74-nations-using-nsa-bug-is-largest-cyber-attack-ever</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Providence-Journal.png</image:loc><image:caption>ProvidenceJournal</image:caption><image:title>ProvidenceJournal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-hires-andrew-borene-as-managing-director-of-u.s.-public-sector-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-posed-as-flirtatious-women-to-target-israeli-officials-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20News%20logo-Apr-08-2022-01-08-34-20-AM.png</image:loc><image:caption>YahooNewslogoApr08202201083420AM</image:caption><image:title>YahooNewslogoApr08202201083420AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-04-08</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-whats-the-problem-with-cyber-insurance</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/62%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>62MALICIOUSLIFE</image:caption><image:title>62MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jeffrey-Smith-Photo-300x300.jpg</image:loc><image:caption>JeffreySmithPhoto300x300</image:caption><image:title>JeffreySmithPhoto300x300</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/notpetya-costs-companies-1.2-billion-in-revenue</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-15T085736.357.png</image:loc><image:caption>blogposttext20220915T085736357</image:caption><image:title>blogposttext20220915T085736357</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Untitled%20design%20(83).jpg</image:loc><image:caption>Untitleddesign83</image:caption><image:title>Untitleddesign83</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T071527.904.png</image:loc><image:caption>blogposttext20221006T071527904</image:caption><image:title>blogposttext20221006T071527904</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-11-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-expansion-with-launch-of-regional-middle-east-operations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IntelligentCISO-1.jpg</image:loc><image:caption>IntelligentCISO1</image:caption><image:title>IntelligentCISO1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/blog/u.k.-cyber-strategy-developing-cybersecurity-skills-knowledge-and-culture</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8994.jpg</image:loc><image:caption>IMG8994</image:caption><image:title>IMG8994</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(91).png</image:loc><image:caption>blogposttext91</image:caption><image:title>blogposttext91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(64).png</image:loc><image:caption>blogposttext64</image:caption><image:title>blogposttext64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94)-1.png</image:loc><image:caption>blogposttext941</image:caption><image:title>blogposttext941</image:title></image:image><lastmod>2022-05-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ta505-abusing-legit-remote-admin-tool-in-string-of-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-2.jpg</image:loc><image:caption>DarkReadinglogo2</image:caption><image:title>DarkReadinglogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2019-04-26</lastmod></url><url><loc>https://www.cybereason.com/blog/wipros-state-of-cybersecurity-report-reveals-valuable-insights</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/wipro-blog-card-final.png</image:loc><image:caption>wiproblogcardfinal</image:caption><image:title>wiproblogcardfinal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(105)-1.png</image:loc><image:caption>blogposttext1051</image:caption><image:title>blogposttext1051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/alastair-martin-hs.png</image:loc><image:caption>alastairmartinhs</image:caption><image:title>alastairmartinhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-15T085736.357.png</image:loc><image:caption>blogposttext20220915T085736357</image:caption><image:title>blogposttext20220915T085736357</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/bootkit-ransomware-baddy-hops-down-badrabbit-hole-in-japan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/The-Register-800x267.jpg</image:loc><image:caption>TheRegister800x267</image:caption><image:title>TheRegister800x267</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-discovers-notpetya-kill-switch</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(3)-2.png</image:loc><image:caption>CISOStoriestemplate32</image:caption><image:title>CISOStoriestemplate32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/petya-banner.png</image:loc><image:caption>petyabanner</image:caption><image:title>petyabanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-02-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news</loc><lastmod>2017-12-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/taking-down-the-internet-possible-but-how-probable</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/network_world.jpg</image:loc><image:caption>networkworld</image:caption><image:title>networkworld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/the-problem-with-kernel-mode-anti-cheat-software-ml-b-side</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/the%20problem%20with%20kernel%20mode%20anti%20cheat%20software-1.png</image:loc><image:caption>theproblemwithkernelmodeanticheatsoftware1</image:caption><image:title>theproblemwithkernelmodeanticheatsoftware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jailbreaking%20Tractors-1.png</image:loc><image:caption>JailbreakingTractors1</image:caption><image:title>JailbreakingTractors1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/resources/pervasive-brazilian-financial-malware-targets-bank-customers-in-latin-america-and-europe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-518230906.jpg</image:loc><image:caption>GettyImages518230906</image:caption><image:title>GettyImages518230906</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-11-30</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-notpetya-45-minutes-and-10000-servers-encrypted</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(3)-2.png</image:loc><image:caption>CISOStoriestemplate32</image:caption><image:title>CISOStoriestemplate32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Todd.png</image:loc><image:caption>Todd</image:caption><image:title>Todd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/colonial-pipeline-paying-the-ransom-shows-that-only-better-security-can-stop-this-vicious-cycle</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-May-21-2021-02-19-15-43-PM.png</image:loc><image:caption>SCMagazinelogoMay21202102191543PM</image:caption><image:title>SCMagazinelogoMay21202102191543PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-05-21</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-legalities-of-the-cyber-war</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/22%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>22MALICIOUSLIFE1</image:caption><image:title>22MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7).png</image:loc><image:caption>MaliciousLifeepisode7</image:caption><image:title>MaliciousLifeepisode7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/liis%20vihul.jpg</image:loc><image:caption>liisvihul</image:caption><image:title>liisvihul</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/resources/reduce-time-to-detect-respond-to-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/TEI-Webinar-Banner-Resources.png</image:loc><image:caption>TEIWebinarBannerResources</image:caption><image:title>TEIWebinarBannerResources</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2020-08-04</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alert-valak</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/YELLOW_THREAT_ALERT_CR_ICONS-53.svg</image:loc><image:caption>YELLOWTHREATALERTCRICONS53</image:caption><image:title>YELLOWTHREATALERTCRICONS53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/resources/defender-spotlight-barros</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Keith-Barros-Defender-Spotlight-On-Demand-Card-up.png</image:loc><image:caption>KeithBarrosDefenderSpotlightOnDemandCardup</image:caption><image:title>KeithBarrosDefenderSpotlightOnDemandCardup</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-02-18</lastmod></url><url><loc>https://www.cybereason.com/resources/ai-hunting-in-action</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Aerial_Road-1.jpg</image:loc><image:caption>AerialRoad1</image:caption><image:title>AerialRoad1</image:title></image:image><lastmod>2019-01-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/zero-days-why-these-security-flaws-are-so-dangerous-and-expensive</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Yahoo!%20News.png</image:loc><image:caption>YahooNews</image:caption><image:title>YahooNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hundreds-of-thousands-of-unpatchable-ip-cameras-affected-by-two-zero-days</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Bleeping-Computer1.png</image:loc><image:caption>BleepingComputer1</image:caption><image:title>BleepingComputer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/platform</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-yellowBG-100px.png</image:loc><image:caption>crchartcheckmarkyellowBG100px</image:caption><image:title>crchartcheckmarkyellowBG100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/xdr-platform-datasheet-cover.png</image:loc><image:caption>xdrplatformdatasheetcover</image:caption><image:title>xdrplatformdatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILITY_HUNTING_CR_ICONS-13.svg</image:loc><image:caption>VISIBILITYHUNTINGCRICONS13</image:caption><image:title>VISIBILITYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--platform-01-gradient.jpg</image:loc><image:caption>crbgheroplatform01gradient</image:caption><image:title>crbgheroplatform01gradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-yellow-bg--top-badge.png</image:loc><image:caption>crlogoyellowbgtopbadge</image:caption><image:title>crlogoyellowbgtopbadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/REALTIME_PROTECTION_MULTILAYERED_CR_ICONS-04.svg</image:loc><image:caption>REALTIMEPROTECTIONMULTILAYEREDCRICONS04</image:caption><image:title>REALTIMEPROTECTIONMULTILAYEREDCRICONS04</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__optional-100px.png</image:loc><image:caption>crchartoptional100px</image:caption><image:title>crchartoptional100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-white-04.png</image:loc><image:caption>crbgsubtlewhite04</image:caption><image:title>crbgsubtlewhite04</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/charts/malop-pyramid-3d.png</image:loc><image:caption>maloppyramid3d</image:caption><image:title>maloppyramid3d</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-100px.png</image:loc><image:caption>crchartcheckmark100px</image:caption><image:title>crchartcheckmark100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/platform-page-featured-image.png</image:loc><image:caption>platformpagefeaturedimage</image:caption><image:title>platformpagefeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/cr-platform-graphic-2024.png</image:loc><image:caption>crplatformgraphic2024</image:caption><image:title>crplatformgraphic2024</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PLATFORM2_CR_ICONS-02.svg</image:loc><image:caption>PLATFORM2CRICONS02</image:caption><image:title>PLATFORM2CRICONS02</image:title></image:image><lastmod>2025-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/bec-security-configuration-snapshot</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/snapshot.png</image:loc><image:caption>snapshot</image:caption><image:title>snapshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(7).png</image:loc><image:caption>BLOGImagesTemplatev27</image:caption><image:title>BLOGImagesTemplatev27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2025-02-25</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-blurring-the-lines-between-nation-state-and-for-profit</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-28T090319.905.png</image:loc><image:caption>blogposttext20220928T090319905</image:caption><image:title>blogposttext20220928T090319905</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/China-01-1024x300.png</image:loc><image:caption>China011024x300</image:caption><image:title>China011024x300</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/why-america-must-take-the-fight-against-cyberterrorism-seriously</loc><image:image><image:loc>https://www.cybereason.com/hubfs/The_Hill_logo.jpeg</image:loc><image:caption>TheHilllogo</image:caption><image:title>TheHilllogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2019-07-19</lastmod></url><url><loc>https://www.cybereason.com/blog/4-tips-for-mitigating-the-risk-of-working-with-security-startups</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-248-Card.png</image:loc><image:caption>MLEp248Card</image:caption><image:title>MLEp248Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-246-Card.png</image:loc><image:caption>MLEp246Card</image:caption><image:title>MLEp246Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-jacob-goldstein-on-the-future-of-bitcoin</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jacob-Goldstein.jpg</image:loc><image:caption>JacobGoldstein</image:caption><image:title>JacobGoldstein</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-226-Card.png</image:loc><image:caption>MLEp226Card</image:caption><image:title>MLEp226Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(15).png</image:loc><image:caption>MaliciousLifeepisode15</image:caption><image:title>MaliciousLifeepisode15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(14).png</image:loc><image:caption>MaliciousLifeepisode14</image:caption><image:title>MaliciousLifeepisode14</image:title></image:image><lastmod>2022-07-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/operation-cloud-hopper-china-based-hackers-target-managed-service-providers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-posed-as-flirtatious-women-to-target-israeli-officials</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bloomberg%20News%20logo-3.png</image:loc><image:caption>BloombergNewslogo3</image:caption><image:title>BloombergNewslogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/crn-interviews-cybereasons-ciso-israel-barak-on-why-its-important-to-train-personnel-to-prevent-security-breaches</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CRN-TV1.jpg</image:loc><image:caption>CRNTV1</image:caption><image:title>CRNTV1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/tour-of-dark-web-markets</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image62-1.png</image:loc><image:caption>image621</image:caption><image:title>image621</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_3661024191.jpg</image:loc><image:caption>shutterstock3661024191</image:caption><image:title>shutterstock3661024191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image52-1.png</image:loc><image:caption>image521</image:caption><image:title>image521</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-144.png</image:loc><image:caption>MaliciousLife144</image:caption><image:title>MaliciousLife144</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/how-countries-can-lose-the-internet-ep-213.png</image:loc><image:caption>howcountriescanlosetheinternetep213</image:caption><image:title>howcountriescanlosetheinternetep213</image:title></image:image><lastmod>2022-02-17</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-launches-regional-partner-program-in-the-middle-east</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-08-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fashion-site-sixth-june-leaking-card-data-to-magecart-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/infosecmag-3.jpg</image:loc><image:caption>infosecmag3</image:caption><image:title>infosecmag3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2019-11-05</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-black-hat-live-an-attack-unraveled-real-life-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/How%20to%20Not%20Build%20a%20Cybersecurity%20Startup-1.png</image:loc><image:caption>HowtoNotBuildaCybersecurityStartup1</image:caption><image:title>HowtoNotBuildaCybersecurityStartup1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/download.png</image:loc><image:caption>download</image:caption><image:title>download</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_201760268.jpg</image:loc><image:caption>shutterstock201760268</image:caption><image:title>shutterstock201760268</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/135%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>135MALICIOUSLIFE</image:caption><image:title>135MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/integrating-endpoint-and-mobile-device-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Integrating%20Endpoint%20and%20Mobile%20Device%20Security%20(1).png</image:loc><image:caption>IntegratingEndpointandMobileDeviceSecurity1</image:caption><image:title>IntegratingEndpointandMobileDeviceSecurity1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T074703.175.png</image:loc><image:caption>blogposttext20220627T074703175</image:caption><image:title>blogposttext20220627T074703175</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture%20(1)-1.png</image:loc><image:caption>Capture11</image:caption><image:title>Capture11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(121).png</image:loc><image:caption>blogposttext121</image:caption><image:title>blogposttext121</image:title></image:image><lastmod>2021-04-26</lastmod></url><url><loc>https://www.cybereason.com/resources/leverage-mitre-attack/webinar/us/082522</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/mitre-cody-aoibh-featured-8-25.png</image:loc><image:caption>mitrecodyaoibhfeatured825</image:caption><image:title>mitrecodyaoibhfeatured825</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><lastmod>2023-06-07</lastmod></url><url><loc>https://www.cybereason.com/resources/true-cost-of-ransomware-leverage-peer-insights-to-defend-against-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/True-Cost-Ransomware-4-4-2024-Webinar.png</image:loc><image:caption>TrueCostRansomware442024Webinar</image:caption><image:title>TrueCostRansomware442024Webinar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><lastmod>2024-04-24</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-china-vs.-github</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Ross%20Rustici.jpg</image:loc><image:caption>RossRustici</image:caption><image:title>RossRustici</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/34%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>34MALICIOUSLIFE</image:caption><image:title>34MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/planned-parenthood-ransomware-attack-puts-400000-patients-at-substantial-risk</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(121).png</image:loc><image:caption>blogposttext121</image:caption><image:title>blogposttext121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ken--2_smaller%20(1).jpg</image:loc><image:caption>Ken2smaller1</image:caption><image:title>Ken2smaller1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(6).png</image:loc><image:caption>ImagefromiOS6</image:caption><image:title>ImagefromiOS6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T074703.175.png</image:loc><image:caption>blogposttext20220627T074703175</image:caption><image:title>blogposttext20220627T074703175</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-v21.1-lts-advancing-prevention-detection-and-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-4.png</image:loc><image:caption>blogposttext4</image:caption><image:title>blogposttext4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-1.png</image:loc><image:caption>CybereasonBlogTemplate31</image:caption><image:title>CybereasonBlogTemplate31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Nov-29-2021-09-12-41-45-PM.png</image:loc><image:caption>image2Nov29202109124145PM</image:caption><image:title>image2Nov29202109124145PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/justin-hs-hex.png</image:loc><image:caption>justinhshex</image:caption><image:title>justinhshex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Nov-29-2021-09-11-58-63-PM.png</image:loc><image:caption>image1Nov29202109115863PM</image:caption><image:title>image1Nov29202109115863PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20advances%20prevention%20data%20collection.png</image:loc><image:caption>Cybereasonadvancespreventiondatacollection</image:caption><image:title>Cybereasonadvancespreventiondatacollection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-11-30</lastmod></url><url><loc>https://www.cybereason.com/blog/intro-to-the-gothic-panda-apt-group</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-5.png</image:loc><image:caption>image45</image:caption><image:title>image45</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T125306.964.png</image:loc><image:caption>blogposttext20221003T125306964</image:caption><image:title>blogposttext20221003T125306964</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T065715.064.png</image:loc><image:caption>blogposttext20221006T065715064</image:caption><image:title>blogposttext20221006T065715064</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_38420236.jpg</image:loc><image:caption>shutterstock38420236</image:caption><image:title>shutterstock38420236</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2019-04-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/zooms-security-pile-on-caused-a-lawsuit-are-microsoft-cisco-and-others-next</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Entrepreneur-1.png</image:loc><image:caption>Entrepreneur1</image:caption><image:title>Entrepreneur1</image:title></image:image><lastmod>2020-04-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/israeli-officials-are-being-catfished-by-apt-c-23-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo-Apr-08-2022-01-04-10-19-AM.png</image:loc><image:caption>ZDNetlogoApr08202201041019AM</image:caption><image:title>ZDNetlogoApr08202201041019AM</image:title></image:image><lastmod>2022-04-08</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-lawerence-berkeley-hack-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-244-Card.png</image:loc><image:caption>MLEp244Card</image:caption><image:title>MLEp244Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(17).png</image:loc><image:caption>MaliciousLifeepisode17</image:caption><image:title>MaliciousLifeepisode17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-its-newest-customer-v12-retail-finance</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-09-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/black-basta-ransomware-group-targeting-us-companies-with-qakbot-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Nov-23-2022-03-39-11-3053-PM.png</image:loc><image:caption>SCMagazinelogoNov2320220339113053PM</image:caption><image:title>SCMagazinelogoNov2320220339113053PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-11-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ddos-attacks-in-nz-not-surprising-but-should-go-away-soon-cybersecurity-expert</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Radio%20New%20Zealand%20logo.png</image:loc><image:caption>RadioNewZealandlogo</image:caption><image:title>RadioNewZealandlogo</image:title></image:image><lastmod>2020-09-03</lastmod></url><url><loc>https://www.cybereason.com/blog/zdnet-cybereason-recognized-as-a-reason-to-watch-and-learn-from-real-time-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/next-generation-endpoint-security-platform-pick-the-one-thats-right-for-you</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(62).png</image:loc><image:caption>blogposttext62</image:caption><image:title>blogposttext62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_321643208-1024x391.jpg</image:loc><image:caption>shutterstock3216432081024x391</image:caption><image:title>shutterstock3216432081024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/139%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>139MALICIOUSLIFE</image:caption><image:title>139MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-hires-andy-byron-as-chief-revenue-officer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-march-15th-ciso-roundtable-top-ciso-priorities-for-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(15).png</image:loc><image:caption>blogposttext15</image:caption><image:title>blogposttext15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mark%20Varner.png</image:loc><image:caption>MarkVarner</image:caption><image:title>MarkVarner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Richard%20Rushing.png</image:loc><image:caption>RichardRushing</image:caption><image:title>RichardRushing</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sydney%20Klein.png</image:loc><image:caption>SydneyKlein</image:caption><image:title>SydneyKlein</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(9).png</image:loc><image:caption>CISOStoriestemplate9</image:caption><image:title>CISOStoriestemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Devon%20Bryan.png</image:loc><image:caption>DevonBryan</image:caption><image:title>DevonBryan</image:title></image:image><lastmod>2024-09-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-decryptors-and-blockers-not-always-a-help-to-victims</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ten-disruptive-startups-worth-watching-closely-in-2016</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-launches-a-new-podcast-malicious-life</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-taps-former-dyson-ciso-ck-chim-as-field-cso-to-support-apac-expansion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T065715.064.png</image:loc><image:caption>blogposttext20221006T065715064</image:caption><image:title>blogposttext20221006T065715064</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(25)-1.png</image:loc><image:caption>CybereasonBlogTemplate251</image:caption><image:title>CybereasonBlogTemplate251</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(81).png</image:loc><image:caption>blogposttext81</image:caption><image:title>blogposttext81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-01-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/office-workers-are-increasingly-being-told-to-wait-until-january-before-they-return</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Boston%20Globe%20logo.png</image:loc><image:caption>BostonGlobelogo</image:caption><image:title>BostonGlobelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-08-06</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alerts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/deadringer-webinar-on-demand-card.png</image:loc><image:caption>deadringerwebinarondemandcard</image:caption><image:title>deadringerwebinarondemandcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/YELLOW_THREAT_ALERT_CR_ICONS-53.svg</image:loc><image:caption>YELLOWTHREATALERTCRICONS53</image:caption><image:title>YELLOWTHREATALERTCRICONS53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-01-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-apt32-hacked-a-global-asian-firm-with-persistence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-inside-the-revil-ransomware-pick-your-path</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(33).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews33</image:caption><image:title>CopyofBLOGSOCIALSETNews33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(102).png</image:loc><image:caption>blogposttext102</image:caption><image:title>blogposttext102</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-02T094314.734.png</image:loc><image:caption>blogposttext20220602T094314734</image:caption><image:title>blogposttext20220602T094314734</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/peter-ortiz-hex-hs.png</image:loc><image:caption>peterortizhexhs</image:caption><image:title>peterortizhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jj-hex-hs2.png</image:loc><image:caption>jjhexhs2</image:caption><image:title>jjhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-09-20</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/niv-yona</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(40).png</image:loc><image:caption>blogposttext40</image:caption><image:title>blogposttext40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-2.jpg</image:loc><image:caption>image62</image:caption><image:title>image62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-03-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-free-software-promises-to-help-smbs-fight-off-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/eWeek.png</image:loc><image:caption>eWeek</image:caption><image:title>eWeek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fauxpersky-malware-steals-and-sends-passwords-to-an-attackers-inbox</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zdnet.png</image:loc><image:caption>zdnet</image:caption><image:title>zdnet</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-03-29</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-ivanti-connect-secure-vpn-zero-day-exploitation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Kotaro-Ogino.jpg</image:loc><image:caption>KotaroOgino</image:caption><image:title>KotaroOgino</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-inc-ransomware-featured-image.png</image:loc><image:caption>threatalertincransomwarefeaturedimage</image:caption><image:title>threatalertincransomwarefeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/citrixbleed-featured-image.png</image:loc><image:caption>citrixbleedfeaturedimage</image:caption><image:title>citrixbleedfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ivanti-blog-1.png</image:loc><image:caption>ivantiblog1</image:caption><image:title>ivantiblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ivanti-blog-3.png</image:loc><image:caption>ivantiblog3</image:caption><image:title>ivantiblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/nicholas-hs.png</image:loc><image:caption>nicholashs</image:caption><image:title>nicholashs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ivanti-threat-alert-blog-featured.png</image:loc><image:caption>ivantithreatalertblogfeatured</image:caption><image:title>ivantithreatalertblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/hema-hs.png</image:loc><image:caption>hemahs</image:caption><image:title>hemahs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ivanti-blog-2.png</image:loc><image:caption>ivantiblog2</image:caption><image:title>ivantiblog2</image:title></image:image><lastmod>2024-02-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/vaccine-against-log4shell-vulnerability-has-potential-and-limitations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/VentureBeat%20logo-2.png</image:loc><image:caption>VentureBeatlogo2</image:caption><image:title>VentureBeatlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/i-am-goot-loader</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Kotaro-Ogino.jpg</image:loc><image:caption>KotaroOgino</image:caption><image:title>KotaroOgino</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/goot-loader-blog-5.png</image:loc><image:caption>gootloaderblog5</image:caption><image:title>gootloaderblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/goot-loader-blog-7.png</image:loc><image:caption>gootloaderblog7</image:caption><image:title>gootloaderblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/goot-loader-blog-3.png</image:loc><image:caption>gootloaderblog3</image:caption><image:title>gootloaderblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/goot-loader-blog-10.png</image:loc><image:caption>gootloaderblog10</image:caption><image:title>gootloaderblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/goot-loader-blog-9.png</image:loc><image:caption>gootloaderblog9</image:caption><image:title>gootloaderblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/goot-loader-blog-11.png</image:loc><image:caption>gootloaderblog11</image:caption><image:title>gootloaderblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Ralph-Villanueva.png</image:loc><image:caption>RalphVillanueva</image:caption><image:title>RalphVillanueva</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/gal-romano.jpg</image:loc><image:caption>galromano</image:caption><image:title>galromano</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/goot-loader-blog-1.png</image:loc><image:caption>gootloaderblog1</image:caption><image:title>gootloaderblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/goot-loader-blog-featured.png</image:loc><image:caption>gootloaderblogfeatured</image:caption><image:title>gootloaderblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat-Alert-GootLoader-SEO-Poisoning.png</image:loc><image:caption>ThreatAlertGootLoaderSEOPoisoning</image:caption><image:title>ThreatAlertGootLoaderSEOPoisoning</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/goot-loader-blog-12.png</image:loc><image:caption>gootloaderblog12</image:caption><image:title>gootloaderblog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/goot-loader-blog-8.png</image:loc><image:caption>gootloaderblog8</image:caption><image:title>gootloaderblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/activemq-blog-featured.png</image:loc><image:caption>activemqblogfeatured</image:caption><image:title>activemqblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/goot-loader-blog-2.png</image:loc><image:caption>gootloaderblog2</image:caption><image:title>gootloaderblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/goot-loader-blog-6.png</image:loc><image:caption>gootloaderblog6</image:caption><image:title>gootloaderblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/goot-loader-blog-4.png</image:loc><image:caption>gootloaderblog4</image:caption><image:title>gootloaderblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2024-06-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/amid-coronavirus-crisis-cybereason-preps-for-virus-voting-impact</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRNtv.jpg</image:loc><image:caption>CRNtv</image:caption><image:title>CRNtv</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/video-researcher-cracks-ransomware-code</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CNN.png</image:loc><image:caption>CNN</image:caption><image:title>CNN</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-receives-a-strong-rating-in-all-edr-use-cases-in-gartners-comparison-of-endpoint-detection-and-response-technologies-and-solutions-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8481.png</image:loc><image:caption>IMG8481</image:caption><image:title>IMG8481</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-vs-cloud-blog.png</image:loc><image:caption>onpremvscloudblog</image:caption><image:title>onpremvscloudblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-01-05</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alert-eventbot</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-stories-from-the-front-lines-of-security-leadership-former-cia-ciso-robert-bigman-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_607834274.jpg</image:loc><image:caption>shutterstock607834274</image:caption><image:title>shutterstock607834274</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(8).png</image:loc><image:caption>CISOStoriespodcast8</image:caption><image:title>CISOStoriespodcast8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/research/brazilian-financial-malware-banking-europe-south-america</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-47.jpg</image:loc><image:caption>Vai47</image:caption><image:title>Vai47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-35.jpg</image:loc><image:caption>Vai35</image:caption><image:title>Vai35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-59.jpg</image:loc><image:caption>Vai59</image:caption><image:title>Vai59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-53.jpg</image:loc><image:caption>Vai53</image:caption><image:title>Vai53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/goot-loader-blog-featured.png</image:loc><image:caption>gootloaderblogfeatured</image:caption><image:title>gootloaderblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-49.jpg</image:loc><image:caption>Vai49</image:caption><image:title>Vai49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202018-11-28%20at%203.44.18%20PM.png</image:loc><image:caption>ScreenShot20181128at34418PM</image:caption><image:title>ScreenShot20181128at34418PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-518230906.jpg</image:loc><image:caption>GettyImages518230906</image:caption><image:title>GettyImages518230906</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-44.jpg</image:loc><image:caption>Vai44</image:caption><image:title>Vai44</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/banks-1.jpg</image:loc><image:caption>banks1</image:caption><image:title>banks1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-9.jpg</image:loc><image:caption>Vai9</image:caption><image:title>Vai9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-1.png</image:loc><image:caption>Vai1</image:caption><image:title>Vai1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-42.jpg</image:loc><image:caption>Vai42</image:caption><image:title>Vai42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-57.jpg</image:loc><image:caption>Vai57</image:caption><image:title>Vai57</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-54.jpg</image:loc><image:caption>Vai54</image:caption><image:title>Vai54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-30.jpg</image:loc><image:caption>Vai30</image:caption><image:title>Vai30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-15.png</image:loc><image:caption>Vai15</image:caption><image:title>Vai15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-46.jpg</image:loc><image:caption>Vai46</image:caption><image:title>Vai46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-7.jpg</image:loc><image:caption>Vai7</image:caption><image:title>Vai7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-63.jpg</image:loc><image:caption>Vai63</image:caption><image:title>Vai63</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3.png</image:loc><image:caption>3</image:caption><image:title>3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(18).png</image:loc><image:caption>BLOGImagesTemplatev218</image:caption><image:title>BLOGImagesTemplatev218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/7.png</image:loc><image:caption>7</image:caption><image:title>7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-41.jpg</image:loc><image:caption>Vai41</image:caption><image:title>Vai41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10.png</image:loc><image:caption>10</image:caption><image:title>10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/4.png</image:loc><image:caption>4</image:caption><image:title>4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-27.png</image:loc><image:caption>Vai27</image:caption><image:title>Vai27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-13.jpg</image:loc><image:caption>Vai13</image:caption><image:title>Vai13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-67.jpg</image:loc><image:caption>Vai67</image:caption><image:title>Vai67</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202018-11-28%20at%2012.08.33%20PM.png</image:loc><image:caption>ScreenShot20181128at120833PM</image:caption><image:title>ScreenShot20181128at120833PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-72.jpg</image:loc><image:caption>Vai72</image:caption><image:title>Vai72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/9.png</image:loc><image:caption>9</image:caption><image:title>9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-14.jpg</image:loc><image:caption>Vai14</image:caption><image:title>Vai14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-66.jpg</image:loc><image:caption>Vai66</image:caption><image:title>Vai66</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-28.jpg</image:loc><image:caption>Vai28</image:caption><image:title>Vai28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-18.jpg</image:loc><image:caption>Vai18</image:caption><image:title>Vai18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-64.jpg</image:loc><image:caption>Vai64</image:caption><image:title>Vai64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-21.jpg</image:loc><image:caption>Vai21</image:caption><image:title>Vai21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-60.jpg</image:loc><image:caption>Vai60</image:caption><image:title>Vai60</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-56.jpg</image:loc><image:caption>Vai56</image:caption><image:title>Vai56</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-20.jpg</image:loc><image:caption>Vai20</image:caption><image:title>Vai20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-36.jpg</image:loc><image:caption>Vai36</image:caption><image:title>Vai36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-65.jpg</image:loc><image:caption>Vai65</image:caption><image:title>Vai65</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/8.png</image:loc><image:caption>8</image:caption><image:title>8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-22.jpg</image:loc><image:caption>Vai22</image:caption><image:title>Vai22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-45.jpg</image:loc><image:caption>Vai45</image:caption><image:title>Vai45</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-23.png</image:loc><image:caption>Vai23</image:caption><image:title>Vai23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202018-11-28%20at%2012.05.22%20PM.png</image:loc><image:caption>ScreenShot20181128at120522PM</image:caption><image:title>ScreenShot20181128at120522PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2-1.png</image:loc><image:caption>21</image:caption><image:title>21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-34.jpg</image:loc><image:caption>Vai34</image:caption><image:title>Vai34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(6)-1.png</image:loc><image:caption>image61</image:caption><image:title>image61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-38.jpg</image:loc><image:caption>Vai38</image:caption><image:title>Vai38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-25.jpg</image:loc><image:caption>Vai25</image:caption><image:title>Vai25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-52.jpg</image:loc><image:caption>Vai52</image:caption><image:title>Vai52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-50.jpg</image:loc><image:caption>Vai50</image:caption><image:title>Vai50</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-48.jpg</image:loc><image:caption>Vai48</image:caption><image:title>Vai48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-24.jpg</image:loc><image:caption>Vai24</image:caption><image:title>Vai24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/lnk.png</image:loc><image:caption>lnk</image:caption><image:title>lnk</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-11.jpg</image:loc><image:caption>Vai11</image:caption><image:title>Vai11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-40.jpg</image:loc><image:caption>Vai40</image:caption><image:title>Vai40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/5-1.png</image:loc><image:caption>51</image:caption><image:title>51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-70.jpg</image:loc><image:caption>Vai70</image:caption><image:title>Vai70</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-5.jpg</image:loc><image:caption>Vai5</image:caption><image:title>Vai5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-26.png</image:loc><image:caption>Vai26</image:caption><image:title>Vai26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-39.jpg</image:loc><image:caption>Vai39</image:caption><image:title>Vai39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-3.jpg</image:loc><image:caption>Vai3</image:caption><image:title>Vai3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-2.jpg</image:loc><image:caption>Vai2</image:caption><image:title>Vai2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-31.jpg</image:loc><image:caption>Vai31</image:caption><image:title>Vai31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-29.jpg</image:loc><image:caption>Vai29</image:caption><image:title>Vai29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-33.jpg</image:loc><image:caption>Vai33</image:caption><image:title>Vai33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200.png</image:loc><image:caption>pastedimage0</image:caption><image:title>pastedimage0</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wmiobject.png</image:loc><image:caption>wmiobject</image:caption><image:title>wmiobject</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-61.jpg</image:loc><image:caption>Vai61</image:caption><image:title>Vai61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-69.jpg</image:loc><image:caption>Vai69</image:caption><image:title>Vai69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cod6.jpg</image:loc><image:caption>cod6</image:caption><image:title>cod6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/coddd.jpg</image:loc><image:caption>coddd</image:caption><image:title>coddd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-73.jpg</image:loc><image:caption>Vai73</image:caption><image:title>Vai73</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-58.jpg</image:loc><image:caption>Vai58</image:caption><image:title>Vai58</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-55.jpg</image:loc><image:caption>Vai55</image:caption><image:title>Vai55</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-12.jpg</image:loc><image:caption>Vai12</image:caption><image:title>Vai12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-71.jpg</image:loc><image:caption>Vai71</image:caption><image:title>Vai71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-4.jpg</image:loc><image:caption>Vai4</image:caption><image:title>Vai4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-37.jpg</image:loc><image:caption>Vai37</image:caption><image:title>Vai37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-10.png</image:loc><image:caption>Vai10</image:caption><image:title>Vai10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-16.png</image:loc><image:caption>Vai16</image:caption><image:title>Vai16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/br_apps.jpg</image:loc><image:caption>brapps</image:caption><image:title>brapps</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/6.png</image:loc><image:caption>6</image:caption><image:title>6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-8.png</image:loc><image:caption>Vai8</image:caption><image:title>Vai8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-6.jpg</image:loc><image:caption>Vai6</image:caption><image:title>Vai6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vai-19.jpg</image:loc><image:caption>Vai19</image:caption><image:title>Vai19</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-to-host-october-2nd-securema-panel-to-help-citizens-learn-how-to-protect-themselves-from-cyberstalkers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-09-18</lastmod></url><url><loc>https://www.cybereason.com/blog/all-things-cybereason-at-2023-rsa-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-rsa-conference-2023.png</image:loc><image:caption>cybereasonrsaconference2023</image:caption><image:title>cybereasonrsaconference2023</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(78).png</image:loc><image:caption>blogposttext78</image:caption><image:title>blogposttext78</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(5).png</image:loc><image:caption>ImagefromiOS5</image:caption><image:title>ImagefromiOS5</image:title></image:image><lastmod>2023-04-19</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-attackers-dont-take-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(21).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews21</image:caption><image:title>CopyofBLOGSOCIALSETNews21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-04-22</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-five-critical-elements-for-protecting-the-right-assets</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Roland%20C.png</image:loc><image:caption>RolandC</image:caption><image:title>RolandC</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template-2.png</image:loc><image:caption>CISOStoriesTemplate2</image:caption><image:title>CISOStoriesTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(7).png</image:loc><image:caption>CISOStoriespodcast7</image:caption><image:title>CISOStoriespodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories.png</image:loc><image:caption>CISOStories</image:caption><image:title>CISOStories</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-silk-road-the-amazon-of-drugs-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(17).png</image:loc><image:caption>MaliciousLifeepisode17</image:caption><image:title>MaliciousLifeepisode17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-07-12</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-the-mitre-attck-framework</loc><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-ATTACK-Blog-1.png</image:loc><image:caption>MITREATTACKBlog1</image:caption><image:title>MITREATTACKBlog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/what-is-mitre-attack-blog-hero-final.png</image:loc><image:caption>whatismitreattackblogherofinal</image:caption><image:title>whatismitreattackblogherofinal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-ATTACK-Blog-3.png</image:loc><image:caption>MITREATTACKBlog3</image:caption><image:title>MITREATTACKBlog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-ATTACK-Blog-2.png</image:loc><image:caption>MITREATTACKBlog2</image:caption><image:title>MITREATTACKBlog2</image:title></image:image><lastmod>2022-06-16</lastmod></url><url><loc>https://www.cybereason.com/blog/solarwinds-attacks-recovery-effort</loc><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SolarWinds%20Attacks%20Recovery%20Effort%20Could%20Take%20U.S.%20Government%2018%20Months.png</image:loc><image:caption>SolarWindsAttacksRecoveryEffortCouldTakeUSGovernment18Months</image:caption><image:title>SolarWindsAttacksRecoveryEffortCouldTakeUSGovernment18Months</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(23).png</image:loc><image:caption>CybereasonBlogTemplate23</image:caption><image:title>CybereasonBlogTemplate23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-05-04</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-why-the-consumer-reports-security-and-privacy-standard-is-great-idea</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-Jan-09-2023-06-47-00-9221-PM.png</image:loc><image:caption>blogposttextJan0920230647009221PM</image:caption><image:title>blogposttextJan0920230647009221PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_583486225.jpg</image:loc><image:caption>shutterstock583486225</image:caption><image:title>shutterstock583486225</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T075722.062.png</image:loc><image:caption>blogposttext20220725T075722062</image:caption><image:title>blogposttext20220725T075722062</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/exploiting-attacker-weak-spots-based-on-tactics-techniques-and-procedures</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_367446221.jpg</image:loc><image:caption>shutterstock367446221</image:caption><image:title>shutterstock367446221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-targets-june-5-to-carry-out-global-cyber-attacks-from-infosecurity-europe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cybereasons-researchers-discuss-2017s-top-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_266682392-1.jpg</image:loc><image:caption>shutterstock2666823921</image:caption><image:title>shutterstock2666823921</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(35).png</image:loc><image:caption>blogposttext35</image:caption><image:title>blogposttext35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(12).png</image:loc><image:caption>blogposttext12</image:caption><image:title>blogposttext12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/three-questions-to-ask-about-ransomware-preparedness</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(75).png</image:loc><image:caption>blogposttext75</image:caption><image:title>blogposttext75</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(20).png</image:loc><image:caption>blogposttext20</image:caption><image:title>blogposttext20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-02-22</lastmod></url><url><loc>https://www.cybereason.com/blog/five-steps-to-improve-defenses-with-mitre-attck</loc><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-ATTACK.png</image:loc><image:caption>MITREATTACK</image:caption><image:title>MITREATTACK</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Posts%20Best%20Results%20in%20History%20of%20MITRE%20ATT&amp;CK%20Evaluations.png</image:loc><image:caption>CybereasonPostsBestResultsinHistoryofMITREATTCKEvaluations</image:caption><image:title>CybereasonPostsBestResultsinHistoryofMITREATTCKEvaluations</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(68).png</image:loc><image:caption>blogposttext68</image:caption><image:title>blogposttext68</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-05T074007.547.png</image:loc><image:caption>blogposttext20220805T074007547</image:caption><image:title>blogposttext20220805T074007547</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T075722.062.png</image:loc><image:caption>blogposttext20220725T075722062</image:caption><image:title>blogposttext20220725T075722062</image:title></image:image><lastmod>2022-08-17</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-nocturnus-team-discovers-the-source-behind-financial-malware-targeting-banks-in-south-america-and-europe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-11-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/information-security-vendor-cybereason-launches-in-australia-partners-with-nextgen-distribution-and-seccom-global</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CRN-Logo-800x392.png</image:loc><image:caption>CRNLogo800x392</image:caption><image:title>CRNLogo800x392</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/stephan-tallent</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15).png</image:loc><image:caption>CybereasonBlogTemplate15</image:caption><image:title>CybereasonBlogTemplate15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Tallent%20Profile%2016.jpg</image:loc><image:caption>TallentProfile16</image:caption><image:title>TallentProfile16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews</image:caption><image:title>CopyofBLOGSOCIALSETNews</image:title></image:image><lastmod>2021-05-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinese-hackers-perform-rarely-seen-windows-mechanism-abuse-in-three-year-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo-May-09-2022-03-13-32-66-PM.png</image:loc><image:caption>ZDNetlogoMay09202203133266PM</image:caption><image:title>ZDNetlogoMay09202203133266PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/blog/how-to-improve-your-organizations-incident-response-plan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_390453973-1000x391.jpg</image:loc><image:caption>shutterstock3904539731000x391</image:caption><image:title>shutterstock3904539731000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories.png</image:loc><image:caption>CISOStories</image:caption><image:title>CISOStories</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Mor%20Levi.jpg</image:loc><image:caption>MorLevi</image:caption><image:title>MorLevi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/why-iot-security-is-still-bs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_387326026.jpg</image:loc><image:caption>shutterstock387326026</image:caption><image:title>shutterstock387326026</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/ar</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/cr-hero-brand-video-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>cr-hero-brand-video-bg</video:title><video:description>cr-hero-brand-video-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/cr-hero-brand-video-bg.mp4</video:content_loc><video:duration>7</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-apple.svg</image:loc><image:caption>smalliconapple</image:caption><image:title>smalliconapple</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__four-lines-185px.png</image:loc><image:caption>crshapestackfourlines185px</image:caption><image:title>crshapestackfourlines185px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase__mobile-group-respondor.png</image:loc><image:caption>crowlshowcasemobilegrouprespondor</image:caption><image:title>crowlshowcasemobilegrouprespondor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-square-multicolor.png</image:loc><image:caption>crshapestackthreesquaremulticolor</image:caption><image:title>crshapestackthreesquaremulticolor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-right-1.svg</image:loc><image:caption>futurereadyright1</image:caption><image:title>futurereadyright1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/homepage/cr-hero__shape-group-02.png</image:loc><image:caption>crheroshapegroup02</image:caption><image:title>crheroshapegroup02</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Approved%20Customer%20Logos/Customer-Logo-Motorola-Black.png</image:loc><image:caption>CustomerLogoMotorolaBlack</image:caption><image:title>CustomerLogoMotorolaBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-detectia-v2-1500px.png</image:loc><image:caption>crowlshowcasedetectiav21500px</image:caption><image:title>crowlshowcasedetectiav21500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zoom.jpg</image:loc><image:caption>zoom</image:caption><image:title>zoom</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-respondor-v2-850px.png</image:loc><image:caption>crowlshowcaserespondorv2850px</image:caption><image:title>crowlshowcaserespondorv2850px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-preventid-1500px.png</image:loc><image:caption>crowlshowcasepreventid1500px</image:caption><image:title>crowlshowcasepreventid1500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/Korean_Air_Logo-BW.png</image:loc><image:caption>KoreanAirLogoBW</image:caption><image:title>KoreanAirLogoBW</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-cloud.svg</image:loc><image:caption>smalliconcloud</image:caption><image:title>smalliconcloud</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-left-1.svg</image:loc><image:caption>futurereadyleft1</image:caption><image:title>futurereadyleft1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/activecampaign-bw.svg</image:loc><image:caption>activecampaignbw</image:caption><image:title>activecampaignbw</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Approved%20Customer%20Logos/Customer-Logo-Softbank-Black.png</image:loc><image:caption>CustomerLogoSoftbankBlack</image:caption><image:title>CustomerLogoSoftbankBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/rich-rushing-hex.png</image:loc><image:caption>richrushinghex</image:caption><image:title>richrushinghex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-hybrid.svg</image:loc><image:caption>smalliconhybrid</image:caption><image:title>smalliconhybrid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/homepage/cr-hero__shape-group-01.png</image:loc><image:caption>crheroshapegroup01</image:caption><image:title>crheroshapegroup01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-on-prem.svg</image:loc><image:caption>smallicononprem</image:caption><image:title>smallicononprem</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-air-gapped.svg</image:loc><image:caption>smalliconairgapped</image:caption><image:title>smalliconairgapped</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/homepage/cr-hero__shape-group-03.png</image:loc><image:caption>crheroshapegroup03</image:caption><image:title>crheroshapegroup03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-windows.svg</image:loc><image:caption>smalliconwindows</image:caption><image:title>smalliconwindows</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-left-2.svg</image:loc><image:caption>futurereadyleft2</image:caption><image:title>futurereadyleft2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-right-2.svg</image:loc><image:caption>futurereadyright2</image:caption><image:title>futurereadyright2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-android.svg</image:loc><image:caption>smalliconandroid</image:caption><image:title>smalliconandroid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase__mobile-group-preventid.png</image:loc><image:caption>crowlshowcasemobilegrouppreventid</image:caption><image:title>crowlshowcasemobilegrouppreventid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-linux.svg</image:loc><image:caption>smalliconlinux</image:caption><image:title>smalliconlinux</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/footer-line.svg</image:loc><image:caption>footerline</image:caption><image:title>footerline</image:title></image:image><lastmod>2023-06-07</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-april-14th-live-attack-simulation-ransomware-threat-hunter-series</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Headshot%20image%20template%20(6).png</image:loc><image:caption>CopyofHeadshotimagetemplate6</image:caption><image:title>CopyofHeadshotimagetemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jj-hex-hs2.png</image:loc><image:caption>jjhexhs2</image:caption><image:title>jjhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(7).png</image:loc><image:caption>blogposttext7</image:caption><image:title>blogposttext7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(67).png</image:loc><image:caption>blogposttext67</image:caption><image:title>blogposttext67</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94).png</image:loc><image:caption>blogposttext94</image:caption><image:title>blogposttext94</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-04-01</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-analysis-report-inside-the-lockbit-arsenal-the-stealbit-exfiltration-tool</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Dec-15-2021-09-29-25-89-PM.png</image:loc><image:caption>image11Dec15202109292589PM</image:caption><image:title>image11Dec15202109292589PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-Dec-15-2021-09-49-45-35-PM.png</image:loc><image:caption>image19Dec15202109494535PM</image:caption><image:title>image19Dec15202109494535PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-1.jpg</image:loc><image:caption>image71</image:caption><image:title>image71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-Dec-15-2021-10-06-56-61-PM.png</image:loc><image:caption>image17Dec15202110065661PM</image:caption><image:title>image17Dec15202110065661PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(5).png</image:loc><image:caption>ThreatAlerttemplate5</image:caption><image:title>ThreatAlerttemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Dec-15-2021-10-03-44-12-PM.png</image:loc><image:caption>image10Dec15202110034412PM</image:caption><image:title>image10Dec15202110034412PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(84).png</image:loc><image:caption>blogposttext84</image:caption><image:title>blogposttext84</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(2).png</image:loc><image:caption>BLOGImagesTemplatev22</image:caption><image:title>BLOGImagesTemplatev22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Dec-15-2021-09-47-36-19-PM.png</image:loc><image:caption>image15Dec15202109473619PM</image:caption><image:title>image15Dec15202109473619PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Dec-15-2021-09-46-14-45-PM.png</image:loc><image:caption>image3Dec15202109461445PM</image:caption><image:title>image3Dec15202109461445PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-1.jpg</image:loc><image:caption>image81</image:caption><image:title>image81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12.jpg</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Dec-15-2021-09-51-52-54-PM.png</image:loc><image:caption>image2Dec15202109515254PM</image:caption><image:title>image2Dec15202109515254PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Dec-15-2021-10-05-43-14-PM.png</image:loc><image:caption>image5Dec15202110054314PM</image:caption><image:title>image5Dec15202110054314PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Dec-15-2021-09-58-27-86-PM.png</image:loc><image:caption>image4Dec15202109582786PM</image:caption><image:title>image4Dec15202109582786PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Dec-15-2021-10-02-37-22-PM.png</image:loc><image:caption>image1Dec15202110023722PM</image:caption><image:title>image1Dec15202110023722PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18.jpg</image:loc><image:caption>image18</image:caption><image:title>image18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Dec-15-2021-10-04-52-43-PM.png</image:loc><image:caption>image6Dec15202110045243PM</image:caption><image:title>image6Dec15202110045243PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Dec-15-2021-09-52-41-46-PM.png</image:loc><image:caption>image16Dec15202109524146PM</image:caption><image:title>image16Dec15202109524146PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Dec-15-2021-10-01-54-90-PM.png</image:loc><image:caption>image9Dec15202110015490PM</image:caption><image:title>image9Dec15202110015490PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14.jpg</image:loc><image:caption>image14</image:caption><image:title>image14</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/resources/astaroth-malware-uses-legitimate-os-and-antivirus-processes-to-steal-passwords-and-personal-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(1)-1.png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-06-07</lastmod></url><url><loc>https://www.cybereason.com/blog/bbj-cybereason-one-of-the-ten-fastest-growing-tech-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/iStock_000028469452_Small-1-800x391.jpg</image:loc><image:caption>iStock000028469452Small1800x391</image:caption><image:title>iStock000028469452Small1800x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat-Alert-GootLoader-SEO-Poisoning.png</image:loc><image:caption>ThreatAlertGootLoaderSEOPoisoning</image:caption><image:title>ThreatAlertGootLoaderSEOPoisoning</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(8).png</image:loc><image:caption>BLOGImagesTemplatev28</image:caption><image:title>BLOGImagesTemplatev28</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/infosec-insight-what-makes-a-good-security-researcher</loc><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/bug-bounty-programs-ep-221.png</image:loc><image:caption>bugbountyprogramsep221</image:caption><image:title>bugbountyprogramsep221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_637229056.jpg</image:loc><image:caption>shutterstock637229056</image:caption><image:title>shutterstock637229056</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/behind-closed-doors-rise-of-remote-access-featured.png</image:loc><image:caption>behindcloseddoorsriseofremoteaccessfeatured</image:caption><image:title>behindcloseddoorsriseofremoteaccessfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-04-02</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-jan-sloots-incredible-data-compression-system</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/94%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>94MALICIOUSLIFE</image:caption><image:title>94MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/reversing-the-adversarial-advantage-how-the-offensive-mindset-may-be-the-best-cyber-defence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybersecurity%20ASEAN%20logo-2.jpg</image:loc><image:caption>CybersecurityASEANlogo2</image:caption><image:title>CybersecurityASEANlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-totok-part-1-how-to-convince-someone-to-download-spyware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/71%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>71MALICIOUSLIFE</image:caption><image:title>71MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-233-Card.png</image:loc><image:caption>MLEp233Card</image:caption><image:title>MLEp233Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1516845699352.jpeg</image:loc><image:caption>1516845699352</image:caption><image:title>1516845699352</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1608478002186.jpeg</image:loc><image:caption>1608478002186</image:caption><image:title>1608478002186</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/resources/7000-irs-later-the-11-essential-cybersecurity-controls</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/controls-cover-web.jpg</image:loc><image:caption>controlscoverweb</image:caption><image:title>controlscoverweb</image:title></image:image><lastmod>2025-09-24</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-lawerence-berkeley-hack-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/russian-fake-news-explained-mlbside-ep-209.png</image:loc><image:caption>russianfakenewsexplainedmlbsideep209</image:caption><image:title>russianfakenewsexplainedmlbsideep209</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt1-ep-210.png</image:loc><image:caption>lawrenceberkelehackpt1ep210</image:caption><image:title>lawrenceberkelehackpt1ep210</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcastthe-equifax-data-breach-pt.-i-a-big-data-bubble</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/assaf.jpg</image:loc><image:caption>assaf</image:caption><image:title>assaf</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/reason-you-dont-have-data-privacy-ep-214.png</image:loc><image:caption>reasonyoudonthavedataprivacyep214</image:caption><image:title>reasonyoudonthavedataprivacyep214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/44%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>44MALICIOUSLIFE</image:caption><image:title>44MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-leo-kuvayev-the-czar-of-spammers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5).png</image:loc><image:caption>MaliciousLifeepisode5</image:caption><image:title>MaliciousLifeepisode5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(24).png</image:loc><image:caption>MaliciousLifeepisode24</image:caption><image:title>MaliciousLifeepisode24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><lastmod>2022-08-22</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-july-21st-2022-leveraging-mitre-attck-to-bolster-your-security-posture</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/aoibh-circle-hs-min.png</image:loc><image:caption>aoibhcirclehsmin</image:caption><image:title>aoibhcirclehsmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/cody-circle-headshot.png</image:loc><image:caption>codycircleheadshot</image:caption><image:title>codycircleheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-07-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomfree-2.2.5.1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/TechCentral.png</image:loc><image:caption>TechCentral</image:caption><image:title>TechCentral</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/dani-wood</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mitre.png</image:loc><image:caption>Mitre</image:caption><image:title>Mitre</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cloud-MITRE-Blog-1.png</image:loc><image:caption>CloudMITREBlog1</image:caption><image:title>CloudMITREBlog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IWD%20blog%20Dani%20wood%20.png</image:loc><image:caption>IWDblogDaniwood</image:caption><image:title>IWDblogDaniwood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/aep-blog-hero-1.png</image:loc><image:caption>aepbloghero1</image:caption><image:title>aepbloghero1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dani%20Wood.jpeg</image:loc><image:caption>DaniWood</image:caption><image:title>DaniWood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDRTesting-blog.png</image:loc><image:caption>EDRTestingblog</image:caption><image:title>EDRTestingblog</image:title></image:image><lastmod>2021-04-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/weaponised-ai.-davey-winder-asks-the-industry-is-that-a-thing-yet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/esg-endpoint-security-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Stock%20images/Analysis.jpeg</image:loc><image:caption>Analysis</image:caption><image:title>Analysis</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-3.png</image:loc><image:caption>CybereasonBlogTemplate53</image:caption><image:title>CybereasonBlogTemplate53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-3.png</image:loc><image:caption>CybereasonBlogTemplate43</image:caption><image:title>CybereasonBlogTemplate43</image:title></image:image><lastmod>2018-04-05</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-announces-latest-speakers-to-join-deep-2017</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-sim-registration-security-or-surveillance</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/federico-links.png</image:loc><image:caption>federicolinks</image:caption><image:title>federicolinks</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/paul-rowney-hs.png</image:loc><image:caption>paulrowneyhs</image:caption><image:title>paulrowneyhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/economics-of-cybersecurity-ep-215.png</image:loc><image:caption>economicsofcybersecurityep215</image:caption><image:title>economicsofcybersecurityep215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-234-card.png</image:loc><image:caption>mlep234card</image:caption><image:title>mlep234card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(21).png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-05-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fakespy-android-malware-disguised-as-postal-service-messages</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo.jpg</image:loc><image:caption>Bankinfosecuritylogo</image:caption><image:title>Bankinfosecuritylogo</image:title></image:image><lastmod>2020-07-15</lastmod></url><url><loc>https://www.cybereason.com/blog/category/all</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/private-infrastructure-protection-version-21-2.mp4/medium.jpg</video:thumbnail_loc><video:title>private-infrastructure-protection-version-21-2</video:title><video:description>private-infrastructure-protection-version-21-2</video:description><video:content_loc>https://www.cybereason.com/hubfs/private-infrastructure-protection-version-21-2.mp4</video:content_loc><video:duration>292</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/the%20problem%20with%20kernel%20mode%20anti%20cheat%20software-1.png</image:loc><image:caption>theproblemwithkernelmodeanticheatsoftware1</image:caption><image:title>theproblemwithkernelmodeanticheatsoftware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-223-Card.png</image:loc><image:caption>MLEp223Card</image:caption><image:title>MLEp223Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1).png</image:loc><image:caption>BLOGPOST1</image:caption><image:title>BLOGPOST1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(17).png</image:loc><image:caption>BLOGImagesTemplatev217</image:caption><image:title>BLOGImagesTemplatev217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/BLOG_Images_Template_v2%20(27).png</image:loc><image:caption>BLOGImagesTemplatev227</image:caption><image:title>BLOGImagesTemplatev227</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/economics-of-cybersecurity-ep-215.png</image:loc><image:caption>economicsofcybersecurityep215</image:caption><image:title>economicsofcybersecurityep215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Cybersecurity-Capability-Industry-Nearly-Forgot.png</image:loc><image:caption>CybersecurityCapabilityIndustryNearlyForgot</image:caption><image:title>CybersecurityCapabilityIndustryNearlyForgot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/goot-loader-blog-featured.png</image:loc><image:caption>gootloaderblogfeatured</image:caption><image:title>gootloaderblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(28).png</image:loc><image:caption>MaliciousLifeepisode28</image:caption><image:title>MaliciousLifeepisode28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-28T090319.905.png</image:loc><image:caption>blogposttext20220928T090319905</image:caption><image:title>blogposttext20220928T090319905</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-242-Card.png</image:loc><image:caption>MLEp242Card</image:caption><image:title>MLEp242Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/anydesk-breach-blog-featured.png</image:loc><image:caption>anydeskbreachblogfeatured</image:caption><image:title>anydeskbreachblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-237-card.png</image:loc><image:caption>mlep237card</image:caption><image:title>mlep237card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(15).png</image:loc><image:caption>BLOGImagesTemplatev215</image:caption><image:title>BLOGImagesTemplatev215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Would%20Happen%20if%20CBS%20Got%20Hacked.png</image:loc><image:caption>WhatWouldHappenifCBSGotHacked</image:caption><image:title>WhatWouldHappenifCBSGotHacked</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cybereason-sdr-evolution-blog-featured-2.png</image:loc><image:caption>cybereasonsdrevolutionblogfeatured2</image:caption><image:title>cybereasonsdrevolutionblogfeatured2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(29).png</image:loc><image:caption>MaliciousLifeepisode29</image:caption><image:title>MaliciousLifeepisode29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ad-fraud-pt1-ep-217.png</image:loc><image:caption>adfraudpt1ep217</image:caption><image:title>adfraudpt1ep217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/soc-dash-23-ram-featured-image.png</image:loc><image:caption>socdash23ramfeaturedimage</image:caption><image:title>socdash23ramfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(23).png</image:loc><image:caption>BLOGImagesTemplatev223</image:caption><image:title>BLOGImagesTemplatev223</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(19).png</image:loc><image:caption>BLOGImagesTemplatev219</image:caption><image:title>BLOGImagesTemplatev219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1)-1.png</image:loc><image:caption>BLOGPOST11</image:caption><image:title>BLOGPOST11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/reason-you-dont-have-data-privacy-ep-214.png</image:loc><image:caption>reasonyoudonthavedataprivacyep214</image:caption><image:title>reasonyoudonthavedataprivacyep214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(30).png</image:loc><image:caption>MaliciousLifeepisode30</image:caption><image:title>MaliciousLifeepisode30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-12T072834.369-1.png</image:loc><image:caption>blogposttext20221012T0728343691</image:caption><image:title>blogposttext20221012T0728343691</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/darkgate-featured.png</image:loc><image:caption>darkgatefeatured</image:caption><image:title>darkgatefeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T072315.427.png</image:loc><image:caption>blogposttext20220913T072315427</image:caption><image:title>blogposttext20220913T072315427</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(5).png</image:loc><image:caption>BLOGImagesTemplatev25</image:caption><image:title>BLOGImagesTemplatev25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/soc-modernization-blog-featured.png</image:loc><image:caption>socmodernizationblogfeatured</image:caption><image:title>socmodernizationblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-part-1-analysis-blog-analysis-featured.png</image:loc><image:caption>cuckoospearpart1analysisbloganalysisfeatured</image:caption><image:title>cuckoospearpart1analysisbloganalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/nfts-disappear-mlbside-ep-207.png</image:loc><image:caption>nftsdisappearmlbsideep207</image:caption><image:title>nftsdisappearmlbsideep207</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T103718.231.png</image:loc><image:caption>blogposttext20220914T103718231</image:caption><image:title>blogposttext20220914T103718231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-vs-cloud-blog.png</image:loc><image:caption>onpremvscloudblog</image:caption><image:title>onpremvscloudblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/olist-cybereason-mdr.png</image:loc><image:caption>olistcybereasonmdr</image:caption><image:title>olistcybereasonmdr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-announcement-blog-featured.png</image:loc><image:caption>onpremannouncementblogfeatured</image:caption><image:title>onpremannouncementblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085148.693.png</image:loc><image:caption>blogposttext20221018T085148693</image:caption><image:title>blogposttext20221018T085148693</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(7).png</image:loc><image:caption>BLOGImagesTemplatev27</image:caption><image:title>BLOGImagesTemplatev27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/snake-python-infostealer-blog-featured.png</image:loc><image:caption>snakepythoninfostealerblogfeatured</image:caption><image:title>snakepythoninfostealerblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T114247.790-1.png</image:loc><image:caption>blogposttext20220913T1142477901</image:caption><image:title>blogposttext20220913T1142477901</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T131959.309.png</image:loc><image:caption>blogposttext20220926T131959309</image:caption><image:title>blogposttext20220926T131959309</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-data-management.png</image:loc><image:caption>cybereasonxdrdatamanagement</image:caption><image:title>cybereasonxdrdatamanagement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202025-01-17%20at%203.25.26%20PM.png</image:loc><image:caption>Screenshot20250117at32526PM</image:caption><image:title>Screenshot20250117at32526PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chrome%20Extension%20Campaign.png</image:loc><image:caption>ChromeExtensionCampaign</image:caption><image:title>ChromeExtensionCampaign</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/alert-fatigue-the-silent-epidemic-featured-blog.png</image:loc><image:caption>alertfatiguethesilentepidemicfeaturedblog</image:caption><image:title>alertfatiguethesilentepidemicfeaturedblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-252-featured.png</image:loc><image:caption>MLEp252featured</image:caption><image:title>MLEp252featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-Jan-09-2023-06-47-00-9221-PM.png</image:loc><image:caption>blogposttextJan0920230647009221PM</image:caption><image:title>blogposttextJan0920230647009221PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-DJvu-variant-featured-image.png</image:loc><image:caption>threatalertDJvuvariantfeaturedimage</image:caption><image:title>threatalertDJvuvariantfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Healthcare%20CISOs%20Can%20Do%20Differently%20Ransomware-1.png</image:loc><image:caption>WhatHealthcareCISOsCanDoDifferentlyRansomware1</image:caption><image:title>WhatHealthcareCISOsCanDoDifferentlyRansomware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-246-Card.png</image:loc><image:caption>MLEp246Card</image:caption><image:title>MLEp246Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-236-card.png</image:loc><image:caption>mlep236card</image:caption><image:title>mlep236card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware%20Which%20Industries%20Are%20Most%20Likely%20to%20Pay-1.png</image:loc><image:caption>RansomwareWhichIndustriesAreMostLikelytoPay1</image:caption><image:title>RansomwareWhichIndustriesAreMostLikelytoPay1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-19T122257.609.png</image:loc><image:caption>blogposttext20220919T122257609</image:caption><image:title>blogposttext20220919T122257609</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T125306.964.png</image:loc><image:caption>blogposttext20221003T125306964</image:caption><image:title>blogposttext20221003T125306964</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2023%20Cybersecurity%20Predictions.png</image:loc><image:caption>2023CybersecurityPredictions</image:caption><image:title>2023CybersecurityPredictions</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20advances%20prevention%20data%20collection.png</image:loc><image:caption>Cybereasonadvancespreventiondatacollection</image:caption><image:title>Cybereasonadvancespreventiondatacollection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-29T075130.403.png</image:loc><image:caption>blogposttext20220929T075130403</image:caption><image:title>blogposttext20220929T075130403</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/bridging-th-gap-blog-featured.png</image:loc><image:caption>bridgingthgapblogfeatured</image:caption><image:title>bridgingthgapblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cloud-detection-sysdig-featured-image.png</image:loc><image:caption>clouddetectionsysdigfeaturedimage</image:caption><image:title>clouddetectionsysdigfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-251-featured.png</image:loc><image:caption>MLEp251featured</image:caption><image:title>MLEp251featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-1.png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(13).png</image:loc><image:caption>BLOGImagesTemplatev213</image:caption><image:title>BLOGImagesTemplatev213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSI%20Masquerading%20as%20a%20Malicious%20Software%20Installer%20blog.png</image:loc><image:caption>MSIMasqueradingasaMaliciousSoftwareInstallerblog</image:caption><image:title>MSIMasqueradingasaMaliciousSoftwareInstallerblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T082054.921.png</image:loc><image:caption>blogposttext20221003T082054921</image:caption><image:title>blogposttext20221003T082054921</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(11).png</image:loc><image:caption>BLOGImagesTemplatev211</image:caption><image:title>BLOGImagesTemplatev211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(18).png</image:loc><image:caption>BLOGImagesTemplatev218</image:caption><image:title>BLOGImagesTemplatev218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ad-fraud-pt2-ep-217.png</image:loc><image:caption>adfraudpt2ep217</image:caption><image:title>adfraudpt2ep217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/machine-timeline-enhancements.png</image:loc><image:caption>machinetimelineenhancements</image:caption><image:title>machinetimelineenhancements</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T112617.289.png</image:loc><image:caption>blogposttext20221003T112617289</image:caption><image:title>blogposttext20221003T112617289</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/epp-changing-of-the-guard-blog-featured.png</image:loc><image:caption>eppchangingoftheguardblogfeatured</image:caption><image:title>eppchangingoftheguardblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T072538.395.png</image:loc><image:caption>blogposttext20220920T072538395</image:caption><image:title>blogposttext20220920T072538395</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20to%20Not%20Build%20a%20Cybersecurity%20Startup-1.png</image:loc><image:caption>HowtoNotBuildaCybersecurityStartup1</image:caption><image:title>HowtoNotBuildaCybersecurityStartup1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/activemq-blog-featured.png</image:loc><image:caption>activemqblogfeatured</image:caption><image:title>activemqblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Black%20Basta%20Threat%20Alert.png</image:loc><image:caption>BlackBastaThreatAlert</image:caption><image:title>BlackBastaThreatAlert</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4)-1.png</image:loc><image:caption>MaliciousLifeepisode41</image:caption><image:title>MaliciousLifeepisode41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/variant-payload-prevention.png</image:loc><image:caption>variantpayloadprevention</image:caption><image:title>variantpayloadprevention</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/capability-vs-usability-blog-featured.png</image:loc><image:caption>capabilityvsusabilityblogfeatured</image:caption><image:title>capabilityvsusabilityblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/bug-bounty-programs-ep-221.png</image:loc><image:caption>bugbountyprogramsep221</image:caption><image:title>bugbountyprogramsep221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lockbit-3-blog-card.png</image:loc><image:caption>lockbit3blogcard</image:caption><image:title>lockbit3blogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/eu-network-information-security-blog-featured.png</image:loc><image:caption>eunetworkinformationsecurityblogfeatured</image:caption><image:title>eunetworkinformationsecurityblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xdr-castle-sky-blog.png</image:loc><image:caption>xdrcastleskyblog</image:caption><image:title>xdrcastleskyblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FBI-CISA-Cuba-Ransomware.png</image:loc><image:caption>FBICISACubaRansomware</image:caption><image:title>FBICISACubaRansomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/behind-closed-doors-rise-of-remote-access-featured.png</image:loc><image:caption>behindcloseddoorsriseofremoteaccessfeatured</image:caption><image:title>behindcloseddoorsriseofremoteaccessfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt1-ep-210.png</image:loc><image:caption>lawrenceberkelehackpt1ep210</image:caption><image:title>lawrenceberkelehackpt1ep210</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/other-problem-with-nfts-ep-206.png</image:loc><image:caption>otherproblemwithnftsep206</image:caption><image:title>otherproblemwithnftsep206</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xy-backdoor-blog-featured.png</image:loc><image:caption>xybackdoorblogfeatured</image:caption><image:title>xybackdoorblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v4_Page_1.png</image:loc><image:caption>BLOGImagesTemplatev4Page1</image:caption><image:title>BLOGImagesTemplatev4Page1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Russian%20Business%20Network.png</image:loc><image:caption>TheRussianBusinessNetwork</image:caption><image:title>TheRussianBusinessNetwork</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(1)-1.png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/hardbit-threat-analysis-featured.png</image:loc><image:caption>hardbitthreatanalysisfeatured</image:caption><image:title>hardbitthreatanalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(2)-1.png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/7-requirements-for-xdr.png</image:loc><image:caption>7requirementsforxdr</image:caption><image:title>7requirementsforxdr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-11T064615.861.png</image:loc><image:caption>blogposttext20221011T064615861</image:caption><image:title>blogposttext20221011T064615861</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/2024-Cybersecurity-Predictions%20-%20Generative-GD-Featured.png</image:loc><image:caption>2024CybersecurityPredictionsGenerativeGDFeatured</image:caption><image:title>2024CybersecurityPredictionsGenerativeGDFeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/generative-ai-dangerous-ep-222.png</image:loc><image:caption>generativeaidangerousep222</image:caption><image:title>generativeaidangerousep222</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/exdr-buyers-guide-23-blog-featured.png</image:loc><image:caption>exdrbuyersguide23blogfeatured</image:caption><image:title>exdrbuyersguide23blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_SonicWall.png</image:loc><image:caption>BLOGImagesSonicWall</image:caption><image:title>BLOGImagesSonicWall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-234-card.png</image:loc><image:caption>mlep234card</image:caption><image:title>mlep234card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T112612.527.png</image:loc><image:caption>blogposttext20220913T112612527</image:caption><image:title>blogposttext20220913T112612527</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T072637.791.png</image:loc><image:caption>blogposttext20221005T072637791</image:caption><image:title>blogposttext20221005T072637791</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-239-Card.png</image:loc><image:caption>MLEp239Card</image:caption><image:title>MLEp239Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(2).png</image:loc><image:caption>BLOGImagesTemplatev22</image:caption><image:title>BLOGImagesTemplatev22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-233-Card.png</image:loc><image:caption>MLEp233Card</image:caption><image:title>MLEp233Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-29T100914.455.png</image:loc><image:caption>blogposttext20220929T100914455</image:caption><image:title>blogposttext20220929T100914455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-248-Card.png</image:loc><image:caption>MLEp248Card</image:caption><image:title>MLEp248Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/threat-analysis-lnk-files-featured-image.png</image:loc><image:caption>threatanalysislnkfilesfeaturedimage</image:caption><image:title>threatanalysislnkfilesfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/beast-ransomware-blog-featured.png</image:loc><image:caption>beastransomwareblogfeatured</image:caption><image:title>beastransomwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2025%20PREDICTIONS%20BY%20GREG%20DAY.jpg</image:loc><image:caption>2025PREDICTIONSBYGREGDAY</image:caption><image:title>2025PREDICTIONSBYGREGDAY</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-226-Card.png</image:loc><image:caption>MLEp226Card</image:caption><image:title>MLEp226Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jailbreaking%20Tractors-1.png</image:loc><image:caption>JailbreakingTractors1</image:caption><image:title>JailbreakingTractors1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Royal%20Ransomware-1.png</image:loc><image:caption>RoyalRansomware1</image:caption><image:title>RoyalRansomware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130836.455.png</image:loc><image:caption>blogposttext20220926T130836455</image:caption><image:title>blogposttext20220926T130836455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason-private-infrastructure-protection-gartner-magic-quadrant.png</image:loc><image:caption>Cybereasonprivateinfrastructureprotectiongartnermagicquadrant</image:caption><image:title>Cybereasonprivateinfrastructureprotectiongartnermagicquadrant</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T134316.545.png</image:loc><image:caption>blogposttext20220914T134316545</image:caption><image:title>blogposttext20220914T134316545</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(8).png</image:loc><image:caption>BLOGImagesTemplatev28</image:caption><image:title>BLOGImagesTemplatev28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113218.959.png</image:loc><image:caption>blogposttext20220920T113218959</image:caption><image:title>blogposttext20220920T113218959</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(24).png</image:loc><image:caption>BLOGImagesTemplatev224</image:caption><image:title>BLOGImagesTemplatev224</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/operation-ivy-bells-ep-208.png</image:loc><image:caption>operationivybellsep208</image:caption><image:title>operationivybellsep208</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR-TOP-11-CONTROLS-web-images-BLOG-Opt.3-V02.png</image:loc><image:caption>CRTOP11CONTROLSwebimagesBLOGOpt3V02</image:caption><image:title>CRTOP11CONTROLSwebimagesBLOGOpt3V02</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q3%202025/Untitled%20presentation%20(3).png</image:loc><image:caption>Untitledpresentation3</image:caption><image:title>Untitledpresentation3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware-shifting-to-cloud.png</image:loc><image:caption>Ransomwareshiftingtocloud</image:caption><image:title>Ransomwareshiftingtocloud</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T065715.064.png</image:loc><image:caption>blogposttext20221006T065715064</image:caption><image:title>blogposttext20221006T065715064</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RSA%20Conference.png</image:loc><image:caption>RSAConference</image:caption><image:title>RSAConference</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-225-Card.png</image:loc><image:caption>MLEp225Card</image:caption><image:title>MLEp225Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/smartest-cybersecurity-minds-2024-blog-featured.png</image:loc><image:caption>smartestcybersecurityminds2024blogfeatured</image:caption><image:title>smartestcybersecurityminds2024blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-ai.png</image:loc><image:caption>cybereasonxdrai</image:caption><image:title>cybereasonxdrai</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-Jan-06-2023-11-40-30-7591-PM.png</image:loc><image:caption>blogposttextJan0620231140307591PM</image:caption><image:title>blogposttextJan0620231140307591PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-244-Card.png</image:loc><image:caption>MLEp244Card</image:caption><image:title>MLEp244Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/TheGentlemen/The%20Gentlemen%20Blog.png</image:loc><image:caption>TheGentlemenBlog</image:caption><image:title>TheGentlemenBlog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-232-Card.png</image:loc><image:caption>MLEp232Card</image:caption><image:title>MLEp232Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Stellar-Discovery_v2.png</image:loc><image:caption>BLOGStellarDiscoveryv2</image:caption><image:title>BLOGStellarDiscoveryv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(16).png</image:loc><image:caption>BLOGImagesTemplatev216</image:caption><image:title>BLOGImagesTemplatev216</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-inc-ransomware-featured-image.png</image:loc><image:caption>threatalertincransomwarefeaturedimage</image:caption><image:title>threatalertincransomwarefeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-245-Card.png</image:loc><image:caption>MLEp245Card</image:caption><image:title>MLEp245Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sliver%20C2-1.png</image:loc><image:caption>SliverC21</image:caption><image:title>SliverC21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/russian-fake-news-explained-mlbside-ep-209.png</image:loc><image:caption>russianfakenewsexplainedmlbsideep209</image:caption><image:title>russianfakenewsexplainedmlbsideep209</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Future%20SOC%20Effectiveness.png</image:loc><image:caption>FutureSOCEffectiveness</image:caption><image:title>FutureSOCEffectiveness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20Ransomware%20is%20Driving%20SOC%20Modernization%20Requirements.png</image:loc><image:caption>HowRansomwareisDrivingSOCModernizationRequirements</image:caption><image:title>HowRansomwareisDrivingSOCModernizationRequirements</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ai-potential-cybersecurity-featured.png</image:loc><image:caption>aipotentialcybersecurityfeatured</image:caption><image:title>aipotentialcybersecurityfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T113003.246.png</image:loc><image:caption>blogposttext20221003T113003246</image:caption><image:title>blogposttext20221003T113003246</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV-redefined-blog-post-text.png</image:loc><image:caption>NGAVredefinedblogposttext</image:caption><image:title>NGAVredefinedblogposttext</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(32).png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-thamar-reservoir.png</image:loc><image:caption>MaliciousLifeepisodethamarreservoir</image:caption><image:title>MaliciousLifeepisodethamarreservoir</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-229-Card.png</image:loc><image:caption>MLEp229Card</image:caption><image:title>MLEp229Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Can%20Chess%20Grandmasters%20Teach%20Us.png</image:loc><image:caption>WhatCanChessGrandmastersTeachUs</image:caption><image:title>WhatCanChessGrandmastersTeachUs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ivanti-threat-alert-blog-featured.png</image:loc><image:caption>ivantithreatalertblogfeatured</image:caption><image:title>ivantithreatalertblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-15T085736.357.png</image:loc><image:caption>blogposttext20220915T085736357</image:caption><image:title>blogposttext20220915T085736357</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-pt-2-featured.png</image:loc><image:caption>cuckoospearpt2featured</image:caption><image:title>cuckoospearpt2featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20img%20lummastealer-1.png</image:loc><image:caption>blogimglummastealer1</image:caption><image:title>blogimglummastealer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat-Alert-GootLoader-SEO-Poisoning.png</image:loc><image:caption>ThreatAlertGootLoaderSEOPoisoning</image:caption><image:title>ThreatAlertGootLoaderSEOPoisoning</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-224-Card.png</image:loc><image:caption>MLEp224Card</image:caption><image:title>MLEp224Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/sony-bmg-rootkit-ep-218.png</image:loc><image:caption>sonybmgrootkitep218</image:caption><image:title>sonybmgrootkitep218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Podcast%20LabMD%20vs%20FTC.png</image:loc><image:caption>MaliciousLifePodcastLabMDvsFTC</image:caption><image:title>MaliciousLifePodcastLabMDvsFTC</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/how-countries-can-lose-the-internet-ep-213.png</image:loc><image:caption>howcountriescanlosetheinternetep213</image:caption><image:title>howcountriescanlosetheinternetep213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8481.png</image:loc><image:caption>IMG8481</image:caption><image:title>IMG8481</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-241-Card.png</image:loc><image:caption>MLEp241Card</image:caption><image:title>MLEp241Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T090944.782.png</image:loc><image:caption>blogposttext20220907T090944782</image:caption><image:title>blogposttext20220907T090944782</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(3)-2.png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2022%20Holiday%20Ransomware%20Study.png</image:loc><image:caption>2022HolidayRansomwareStudy</image:caption><image:title>2022HolidayRansomwareStudy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/keeping%20up%20with%20ai%20innovation%20blog%20img.png</image:loc><image:caption>keepingupwithaiinnovationblogimg</image:caption><image:title>keepingupwithaiinnovationblogimg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-mitre-23-lp-featured-1.png</image:loc><image:caption>crmitre23lpfeatured1</image:caption><image:title>crmitre23lpfeatured1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-rsa-conference-2023.png</image:loc><image:caption>cybereasonrsaconference2023</image:caption><image:title>cybereasonrsaconference2023</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/citrixbleed-featured-image.png</image:loc><image:caption>citrixbleedfeaturedimage</image:caption><image:title>citrixbleedfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(1).png</image:loc><image:caption>BLOGImagesTemplatev21</image:caption><image:title>BLOGImagesTemplatev21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113510.582.png</image:loc><image:caption>blogposttext20220920T113510582</image:caption><image:title>blogposttext20220920T113510582</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/From%20Scripts%20to%20Systems-%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations/BLOG_Images_Template_v2%20(28).png</image:loc><image:caption>BLOGImagesTemplatev228</image:caption><image:title>BLOGImagesTemplatev228</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Biden-cybersecurity-strategy.png</image:loc><image:caption>Bidencybersecuritystrategy</image:caption><image:title>Bidencybersecuritystrategy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(31).png</image:loc><image:caption>MaliciousLifeepisode31</image:caption><image:title>MaliciousLifeepisode31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(9).png</image:loc><image:caption>BLOGImagesTemplatev29</image:caption><image:title>BLOGImagesTemplatev29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5)-1.png</image:loc><image:caption>MaliciousLifeepisode51</image:caption><image:title>MaliciousLifeepisode51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ML-Ep-249-featured.png</image:loc><image:caption>MLEp249featured</image:caption><image:title>MLEp249featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-247-Card.png</image:loc><image:caption>MLEp247Card</image:caption><image:title>MLEp247Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/5%20steps%20to%20more%20effective%20ransomware%20response.png</image:loc><image:caption>5stepstomoreeffectiveransomwareresponse</image:caption><image:title>5stepstomoreeffectiveransomwareresponse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/youtube-malware-blog-featured.png</image:loc><image:caption>youtubemalwareblogfeatured</image:caption><image:title>youtubemalwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(14).png</image:loc><image:caption>BLOGImagesTemplatev214</image:caption><image:title>BLOGImagesTemplatev214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(27).png</image:loc><image:caption>BLOGImagesTemplatev227</image:caption><image:title>BLOGImagesTemplatev227</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T071527.904.png</image:loc><image:caption>blogposttext20221006T071527904</image:caption><image:title>blogposttext20221006T071527904</image:title></image:image><lastmod>2022-02-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-softbank-has-already-brought-to-boston-tech</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-smarttech247-partner-to-deliver-managed-detection-and-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(23)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews231</image:caption><image:title>CopyofBLOGSOCIALSETNews231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-09-09</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/eran-ayalon</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Eran%20Ayalon.png</image:loc><image:caption>EranAyalon</image:caption><image:title>EranAyalon</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-09-22</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-creating-bsides-a-grassroots-security-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200-May-09-2021-10-37-02-54-AM.png</image:loc><image:caption>pastedimage0May09202110370254AM</image:caption><image:title>pastedimage0May09202110370254AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>CopyofBLOGSOCIALSETMALICIOUSLIFE</image:caption><image:title>CopyofBLOGSOCIALSETMALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><lastmod>2021-08-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/colonial-pipeline-attack-all-monsters-are-human</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Govinfosecurity.com%20logo-3.jpg</image:loc><image:caption>Govinfosecuritycomlogo3</image:caption><image:title>Govinfosecuritycomlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://www.cybereason.com/resources/ransomware-impact-to-cyber-ir-strategies/webinar/us/090822</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/greg-day-webinar-9-8-22-card.png</image:loc><image:caption>gregdaywebinar9822card</image:caption><image:title>gregdaywebinar9822card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-09-28</lastmod></url><url><loc>https://www.cybereason.com/consulting/experts/michael-quinn</loc><lastmod>2025-08-19</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/bhanu-sareddy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bhanucropped-193332-edited.jpg</image:loc><image:caption>bhanucropped193332edited</image:caption><image:title>bhanucropped193332edited</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/royal-ransomware-puts-novel-spin-on-encryption-tactics</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-Dec-14-2022-07-19-17-3502-PM.png</image:loc><image:caption>DarkReadinglogoDec1420220719173502PM</image:caption><image:title>DarkReadinglogoDec1420220719173502PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-12-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/feds-provide-legal-loophole-to-hacking-iot-devices</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CSO.png</image:loc><image:caption>CSO</image:caption><image:title>CSO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-20</lastmod></url><url><loc>https://www.cybereason.com/blog/the-value-drivers-for-an-xdr-investment</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(18).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews18</image:caption><image:title>CopyofBLOGSOCIALSETNews18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-12T072834.369-1.png</image:loc><image:caption>blogposttext20221012T0728343691</image:caption><image:title>blogposttext20221012T0728343691</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(2)-1.png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/age-of-cybereason-security-startup-out-to-stop-hackers-in-the-act</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/conomy.jpg</image:loc><image:caption>conomy</image:caption><image:title>conomy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/after-the-worst-year-ever-for-ransomware-2021-will-be-more-of-the-same</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Jan-04-2021-01-29-45-50-AM.png</image:loc><image:caption>SCMagazinelogoJan04202101294550AM</image:caption><image:title>SCMagazinelogoJan04202101294550AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-01-04</lastmod></url><url><loc>https://www.cybereason.com/blog/what-are-the-legal-implications-from-a-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(13).png</image:loc><image:caption>blogposttext13</image:caption><image:title>blogposttext13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T134258.568.png</image:loc><image:caption>blogposttext20220627T134258568</image:caption><image:title>blogposttext20220627T134258568</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-02T070344.027.png</image:loc><image:caption>blogposttext20220802T070344027</image:caption><image:title>blogposttext20220802T070344027</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-06-28</lastmod></url><url><loc>https://www.cybereason.com/blog/using-a-mac-please-update-now</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image-for-amit-3_24-blog-300x109.png</image:loc><image:caption>imageforamit324blog300x109</image:caption><image:title>imageforamit324blog300x109</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(18).png</image:loc><image:caption>BLOGImagesTemplatev218</image:caption><image:title>BLOGImagesTemplatev218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-2.jpg</image:loc><image:caption>Untitleddesign2</image:caption><image:title>Untitleddesign2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/resources/mobile-security-in-a-remote-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mobile-Security-Remote-World-Webinar-On-Demand-LI.png</image:loc><image:caption>MobileSecurityRemoteWorldWebinarOnDemandLI</image:caption><image:title>MobileSecurityRemoteWorldWebinarOnDemandLI</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2020-09-09</lastmod></url><url><loc>https://www.cybereason.com/attack-simulation-series</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/owl-burst-zoom.mp4/medium.jpg</video:thumbnail_loc><video:title>owl-burst-zoom</video:title><video:description>owl-burst-zoom</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/owl-burst-zoom.mp4</video:content_loc><video:duration>5</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/attack-simulations-home-card.png</image:loc><image:caption>attacksimulationshomecard</image:caption><image:title>attacksimulationshomecard</image:title></image:image><lastmod>2024-10-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-exploit-microsoft-exchange-server-vulnerabilities-in-enterprise-phishing-campaigns</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-Jan-29-2022-02-46-35-40-PM.png</image:loc><image:caption>MSSPAlertlogoJan29202202463540PM</image:caption><image:title>MSSPAlertlogoJan29202202463540PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-is-there-a-magic-security-control-list</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(1)-3.png</image:loc><image:caption>pastedimage013</image:caption><image:title>pastedimage013</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(2).png</image:loc><image:caption>CISOStoriespodcast2</image:caption><image:title>CISOStoriespodcast2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-Magic-blog.png</image:loc><image:caption>CISOMagicblog</image:caption><image:title>CISOMagicblog</image:title></image:image><lastmod>2021-09-21</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-pen-testing-vs-threat-hunting-understanding-the-differences</loc><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(18).png</image:loc><image:caption>BLOGImagesTemplatev218</image:caption><image:title>BLOGImagesTemplatev218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/pentest-hunt-banner.jpg</image:loc><image:caption>pentesthuntbanner</image:caption><image:title>pentesthuntbanner</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/indonesias-central-bank-admits-to-suffering-ransomware-attack-in-dec-2021</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CyberSec%20Asia%20logo.png</image:loc><image:caption>CyberSecAsialogo</image:caption><image:title>CyberSecAsialogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/telcos-in-asia-being-hacked-by-chinese</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/US%20News%20&amp;%20World%20Report%20logo-1.png</image:loc><image:caption>USNewsWorldReportlogo1</image:caption><image:title>USNewsWorldReportlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/python-ransomware-uses-a-unique-key-for-each-file-that-is-encrypted</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/category/research</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews</image:caption><image:title>CopyofBLOGSOCIALSETNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Copy%20of%20RYUK1.png</image:loc><image:caption>CopyofCopyofRYUK1</image:caption><image:title>CopyofCopyofRYUK1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/snake-python-infostealer-blog-featured.png</image:loc><image:caption>snakepythoninfostealerblogfeatured</image:caption><image:title>snakepythoninfostealerblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template-2.png</image:loc><image:caption>CybereasonVsTemplate2</image:caption><image:title>CybereasonVsTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T103718.231.png</image:loc><image:caption>blogposttext20220914T103718231</image:caption><image:title>blogposttext20220914T103718231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sodinokibi-blog-1.png</image:loc><image:caption>Sodinokibiblog1</image:caption><image:title>Sodinokibiblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20img%20lummastealer-1.png</image:loc><image:caption>blogimglummastealer1</image:caption><image:title>blogimglummastealer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template.png</image:loc><image:caption>CybereasonVsTemplate</image:caption><image:title>CybereasonVsTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T093119.758.png</image:loc><image:caption>blogposttext20220830T093119758</image:caption><image:title>blogposttext20220830T093119758</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/amazon-gift-card-blog-card.png</image:loc><image:caption>amazongiftcardblogcard</image:caption><image:title>amazongiftcardblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(5).png</image:loc><image:caption>ThreatAlerttemplate5</image:caption><image:title>ThreatAlerttemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xy-backdoor-blog-featured.png</image:loc><image:caption>xybackdoorblogfeatured</image:caption><image:title>xybackdoorblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews3</image:caption><image:title>CopyofBLOGSOCIALSETNews3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lockbit-3-blog-card.png</image:loc><image:caption>lockbit3blogcard</image:caption><image:title>lockbit3blogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(1).png</image:loc><image:caption>CopyofThreatAlertAnalysis1</image:caption><image:title>CopyofThreatAlertAnalysis1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-inc-ransomware-featured-image.png</image:loc><image:caption>threatalertincransomwarefeaturedimage</image:caption><image:title>threatalertincransomwarefeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/beast-ransomware-blog-featured.png</image:loc><image:caption>beastransomwareblogfeatured</image:caption><image:title>beastransomwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/anydesk-breach-blog-featured.png</image:loc><image:caption>anydeskbreachblogfeatured</image:caption><image:title>anydeskbreachblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fakespy-centered.png</image:loc><image:caption>Fakespycentered</image:caption><image:title>Fakespycentered</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Darkside-blog.png</image:loc><image:caption>Darksideblog</image:caption><image:title>Darksideblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-4.png</image:loc><image:caption>PhoenixKeylogger4</image:caption><image:title>PhoenixKeylogger4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CopyofCybereasonBlogHeroTemplate1</image:caption><image:title>CopyofCybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T115923.524.png</image:loc><image:caption>blogposttext20220815T115923524</image:caption><image:title>blogposttext20220815T115923524</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Prometei-botnet-featured-blog-image.png</image:loc><image:caption>Prometeibotnetfeaturedblogimage</image:caption><image:title>Prometeibotnetfeaturedblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/goot-loader-blog-featured.png</image:loc><image:caption>gootloaderblogfeatured</image:caption><image:title>gootloaderblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(5).png</image:loc><image:caption>CopyofThreatAlertAnalysis5</image:caption><image:title>CopyofThreatAlertAnalysis5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(125).png</image:loc><image:caption>blogposttext125</image:caption><image:title>blogposttext125</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(3).png</image:loc><image:caption>Vs3</image:caption><image:title>Vs3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/true%20cost%20to%20business%201200x628.png</image:loc><image:caption>truecosttobusiness1200x628</image:caption><image:title>truecosttobusiness1200x628</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/behind-closed-doors-rise-of-remote-access-featured.png</image:loc><image:caption>behindcloseddoorsriseofremoteaccessfeatured</image:caption><image:title>behindcloseddoorsriseofremoteaccessfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T113003.246.png</image:loc><image:caption>blogposttext20221003T113003246</image:caption><image:title>blogposttext20221003T113003246</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mobile-eventbot-hero-A.png</image:loc><image:caption>mobileeventbotheroA</image:caption><image:title>mobileeventbotheroA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-Hero-5.png</image:loc><image:caption>ValakHero5</image:caption><image:title>ValakHero5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(6).png</image:loc><image:caption>ThreatAlerttemplate6</image:caption><image:title>ThreatAlerttemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(124).png</image:loc><image:caption>blogposttext124</image:caption><image:title>blogposttext124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/darkgate-featured.png</image:loc><image:caption>darkgatefeatured</image:caption><image:title>darkgatefeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(1).png</image:loc><image:caption>ThreatAlerttemplate1</image:caption><image:title>ThreatAlerttemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-12.png</image:loc><image:caption>RaccoonBlog12</image:caption><image:title>RaccoonBlog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/activemq-blog-featured.png</image:loc><image:caption>activemqblogfeatured</image:caption><image:title>activemqblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/milan-degraeve-0ztvUdH5b-A-unsplash.jpg</image:loc><image:caption>milandegraeve0ztvUdH5bAunsplash</image:caption><image:title>milandegraeve0ztvUdH5bAunsplash</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/molerats-malware-blog-hero-a.png</image:loc><image:caption>moleratsmalwareblogheroa</image:caption><image:title>moleratsmalwareblogheroa</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/citrixbleed-featured-image.png</image:loc><image:caption>citrixbleedfeaturedimage</image:caption><image:title>citrixbleedfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-pt-2-featured.png</image:loc><image:caption>cuckoospearpt2featured</image:caption><image:title>cuckoospearpt2featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(4).png</image:loc><image:caption>CopyofThreatAlertAnalysis4</image:caption><image:title>CopyofThreatAlertAnalysis4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ivanti-threat-alert-blog-featured.png</image:loc><image:caption>ivantithreatalertblogfeatured</image:caption><image:title>ivantithreatalertblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yellow%20background%20%2B%20Texture%20Sample%20(1).png</image:loc><image:caption>YellowbackgroundTextureSample1</image:caption><image:title>YellowbackgroundTextureSample1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template%20(2).png</image:loc><image:caption>CybereasonVsTemplate2</image:caption><image:title>CybereasonVsTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Stellar-Discovery_v2.png</image:loc><image:caption>BLOGStellarDiscoveryv2</image:caption><image:title>BLOGStellarDiscoveryv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/hacking-the-hackers-blog-header.png</image:loc><image:caption>hackingthehackersblogheader</image:caption><image:title>hackingthehackersblogheader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T071524.894.png</image:loc><image:caption>blogposttext20220707T071524894</image:caption><image:title>blogposttext20220707T071524894</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-part-1-analysis-blog-analysis-featured.png</image:loc><image:caption>cuckoospearpart1analysisbloganalysisfeatured</image:caption><image:title>cuckoospearpart1analysisbloganalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_Kimsuky%20KGH%20Spyware%20Suite%20-%20image.png</image:loc><image:caption>KimsukyKGHSpywareSuiteimage</image:caption><image:title>KimsukyKGHSpywareSuiteimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/chaes-malware-blog-card.png</image:loc><image:caption>chaesmalwareblogcard</image:caption><image:title>chaesmalwareblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(96).png</image:loc><image:caption>blogposttext96</image:caption><image:title>blogposttext96</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SOCIAL-2.png</image:loc><image:caption>SOCIAL2</image:caption><image:title>SOCIAL2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(33).png</image:loc><image:caption>blogposttext33</image:caption><image:title>blogposttext33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/molerats-pt2-blog-card.png</image:loc><image:caption>moleratspt2blogcard</image:caption><image:title>moleratspt2blogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20RYUK1.png</image:loc><image:caption>CopyofRYUK1</image:caption><image:title>CopyofRYUK1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(123).png</image:loc><image:caption>blogposttext123</image:caption><image:title>blogposttext123</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/youtube-malware-blog-featured.png</image:loc><image:caption>youtubemalwareblogfeatured</image:caption><image:title>youtubemalwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-32.png</image:loc><image:caption>WorkinprogressGlupteba32</image:caption><image:title>WorkinprogressGlupteba32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/capability-vs-usability-blog-featured.png</image:loc><image:caption>capabilityvsusabilityblogfeatured</image:caption><image:title>capabilityvsusabilityblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/palestine-attacks-blog-image.png</image:loc><image:caption>palestineattacksblogimage</image:caption><image:title>palestineattacksblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T112617.289.png</image:loc><image:caption>blogposttext20221003T112617289</image:caption><image:title>blogposttext20221003T112617289</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>BLOGSOCIALSETNews11</image:caption><image:title>BLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/op-soft-cell.jpg</image:loc><image:caption>opsoftcell</image:caption><image:title>opsoftcell</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bazar-of-tricks-blog-image.png</image:loc><image:caption>bazaroftricksblogimage</image:caption><image:title>bazaroftricksblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(2).png</image:loc><image:caption>CopyofThreatAlertAnalysis2</image:caption><image:title>CopyofThreatAlertAnalysis2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T090944.782.png</image:loc><image:caption>blogposttext20220907T090944782</image:caption><image:title>blogposttext20220907T090944782</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ryuk-ransomware-illus.png</image:loc><image:caption>ryukransomwareillus</image:caption><image:title>ryukransomwareillus</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20vs.%20SolarWinds%20Attack.png</image:loc><image:caption>CybereasonvsSolarWindsAttack</image:caption><image:title>CybereasonvsSolarWindsAttack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews31</image:caption><image:title>CopyofBLOGSOCIALSETNews31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1).png</image:loc><image:caption>BLOGPOST1</image:caption><image:title>BLOGPOST1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis.png</image:loc><image:caption>CopyofThreatAlertAnalysis</image:caption><image:title>CopyofThreatAlertAnalysis</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vs-ransomware.png</image:loc><image:caption>vsransomware</image:caption><image:title>vsransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusa-blog.png</image:loc><image:caption>medusablog</image:caption><image:title>medusablog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/hardbit-threat-analysis-featured.png</image:loc><image:caption>hardbitthreatanalysisfeatured</image:caption><image:title>hardbitthreatanalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(2).png</image:loc><image:caption>ImagefromiOS2</image:caption><image:title>ImagefromiOS2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-DJvu-variant-featured-image.png</image:loc><image:caption>threatalertDJvuvariantfeaturedimage</image:caption><image:title>threatalertDJvuvariantfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(3).png</image:loc><image:caption>CopyofThreatAlertAnalysis3</image:caption><image:title>CopyofThreatAlertAnalysis3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RYUK1%20(1).png</image:loc><image:caption>RYUK11</image:caption><image:title>RYUK11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware-honeypot-blog.jpg</image:loc><image:caption>ransomwarehoneypotblog</image:caption><image:title>ransomwarehoneypotblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/threat-analysis-lnk-files-featured-image.png</image:loc><image:caption>threatanalysislnkfilesfeaturedimage</image:caption><image:title>threatanalysislnkfilesfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-vs-cloud-blog.png</image:loc><image:caption>onpremvscloudblog</image:caption><image:title>onpremvscloudblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bitbucket-blog-image.png</image:loc><image:caption>bitbucketblogimage</image:caption><image:title>bitbucketblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template%20(1).png</image:loc><image:caption>CybereasonVsTemplate1</image:caption><image:title>CybereasonVsTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fintech-Hack-Evilnum-2.jpg</image:loc><image:caption>FintechHackEvilnum2</image:caption><image:title>FintechHackEvilnum2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(2).png</image:loc><image:caption>BLOGImagesTemplatev22</image:caption><image:title>BLOGImagesTemplatev22</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-astaroth-trojan-variant-exploits-anti-malware-software-to-steal-info</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BleepingComputer%20logo.jpg</image:loc><image:caption>BleepingComputerlogo</image:caption><image:title>BleepingComputerlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2019-02-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/catching-the-hackers-in-the-act</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bbc-logo.jpg</image:loc><image:caption>bbclogo</image:caption><image:title>bbclogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/platform/ransomware-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/cr-product-interface--imac-trans-min.png</image:loc><image:caption>crproductinterfaceimactransmin</image:caption><image:title>crproductinterfaceimactransmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-ransomware-report--double-page.png</image:loc><image:caption>crransomwarereportdoublepage</image:caption><image:title>crransomwarereportdoublepage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-icon--black.svg</image:loc><image:caption>crlogoiconblack</image:caption><image:title>crlogoiconblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/1200x627_Predictive%20ransomware-1.jpg</image:loc><image:caption>1200x627Predictiveransomware1</image:caption><image:title>1200x627Predictiveransomware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/ransomops-whitepaper-cover.png</image:loc><image:caption>ransomopswhitepapercover</image:caption><image:title>ransomopswhitepapercover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--owl-vector-swoop-dark.jpg</image:loc><image:caption>crbgheroowlvectorswoopdark</image:caption><image:title>crbgheroowlvectorswoopdark</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/ransomware-true-cost-2022-cover-rounded--min.png</image:loc><image:caption>ransomwaretruecost2022coverroundedmin</image:caption><image:title>ransomwaretruecost2022coverroundedmin</image:title></image:image><lastmod>2024-01-10</lastmod></url><url><loc>https://www.cybereason.com/press/world-wide-technology-and-cybereason-partner-to-bring-an-automated-cybersecurity-platform-to-global-1000-enterprises</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-10-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-the-ransomware-attack-means-for-massachusetts-businesses</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Boston-Business-Journal.jpg</image:loc><image:caption>BostonBusinessJournal</image:caption><image:title>BostonBusinessJournal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/employee-spotlight-on-values-and-culture-at-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20Hadar%20Harari.png</image:loc><image:caption>EmployeeSpotlightHadarHarari</image:caption><image:title>EmployeeSpotlightHadarHarari</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hadar.jpeg</image:loc><image:caption>Hadar</image:caption><image:title>Hadar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Defendercon_LP_no%20time.jpg</image:loc><image:caption>1200x627DefenderconLPnotime</image:caption><image:title>1200x627DefenderconLPnotime</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(105)-1.png</image:loc><image:caption>blogposttext1051</image:caption><image:title>blogposttext1051</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecurity-experts-say-more-wide-scale-attacks-like-solarwinds-hack-likely</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cheddar%20logo-1.png</image:loc><image:caption>Cheddarlogo1</image:caption><image:title>Cheddarlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-01-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/massive-global-botnet-takes-advantage-of-microsoft-exchange-vulnerabilities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRadar%20logo-2.png</image:loc><image:caption>TechRadarlogo2</image:caption><image:title>TechRadarlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/insourcing-versus-outsourcing</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1)-1.png</image:loc><image:caption>BLOGPOST11</image:caption><image:title>BLOGPOST11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/soc-modernization-blog-featured.png</image:loc><image:caption>socmodernizationblogfeatured</image:caption><image:title>socmodernizationblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(79).png</image:loc><image:caption>blogposttext79</image:caption><image:title>blogposttext79</image:title></image:image><lastmod>2024-11-08</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-ghost-in-the-machine</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/135%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>135MALICIOUSLIFE</image:caption><image:title>135MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Stephen_Cobb.jpeg</image:loc><image:caption>StephenCobb</image:caption><image:title>StephenCobb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(2)-1.png</image:loc><image:caption>MaliciousLifeTemplate21</image:caption><image:title>MaliciousLifeTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>1MALICIOUSLIFE</image:caption><image:title>1MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/blog/what-the-growing-costs-of-a-data-breach-means-for-the-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(37).png</image:loc><image:caption>CybereasonBlogTemplate37</image:caption><image:title>CybereasonBlogTemplate37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(99).png</image:loc><image:caption>blogposttext99</image:caption><image:title>blogposttext99</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hot-topics-at-the-rsa-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/network_world.jpg</image:loc><image:caption>networkworld</image:caption><image:title>networkworld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/this-trojan-exploits-antivirus-software-to-steal-your-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zdnet-logo-large-1.png</image:loc><image:caption>zdnetlogolarge1</image:caption><image:title>zdnetlogolarge1</image:title></image:image><lastmod>2019-02-14</lastmod></url><url><loc>https://www.cybereason.com/rsac-2024</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--secondary-reversed.png</image:loc><image:caption>crlogoinlinesecondaryreversed</image:caption><image:title>crlogoinlinesecondaryreversed</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-logo--pattern-yellow-bg.jpg</image:loc><image:caption>crlogopatternyellowbg</image:caption><image:title>crlogopatternyellowbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/greg%20circle.png</image:loc><image:caption>gregcircle</image:caption><image:title>gregcircle</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/iconsand.png</image:loc><image:caption>iconsand</image:caption><image:title>iconsand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Images/bg-dark-concrete.jpg</image:loc><image:caption>bgdarkconcrete</image:caption><image:title>bgdarkconcrete</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RSAC_Background.png</image:loc><image:caption>RSACBackground</image:caption><image:title>RSACBackground</image:title></image:image><lastmod>2024-04-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/facebook-admits-storing-millions-of-user-passwords-in-plain-text-files-for-years</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Independent.png</image:loc><image:caption>Independent</image:caption><image:title>Independent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2019-03-21</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-the-cyberrisk-alliances-cybersecurity-collaborative-launch-the-ciso-stories-podcast</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-03-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-special-note-for-data-privacy-day</loc><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Feb-04-2021-02-24-12-48-PM.png</image:loc><image:caption>SCMagazinelogoFeb04202102241248PM</image:caption><image:title>SCMagazinelogoFeb04202102241248PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-02-04</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-life-and-exploits-of-albert-gonzales-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(2).png</image:loc><image:caption>MaliciousLifeTemplate2</image:caption><image:title>MaliciousLifeTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(5)-1.png</image:loc><image:caption>pastedimage051</image:caption><image:title>pastedimage051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/mitre-attack-resources</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Split_1920x1080.jpg</image:loc><image:caption>Split1920x1080</image:caption><image:title>Split1920x1080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Stock%20images/coffeelaptop.jpeg</image:loc><image:caption>coffeelaptop</image:caption><image:title>coffeelaptop</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/five-steps-mitre-cover.png</image:loc><image:caption>fivestepsmitrecover</image:caption><image:title>fivestepsmitrecover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/Dark_Gunmetal.png</image:loc><image:caption>DarkGunmetal</image:caption><image:title>DarkGunmetal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/remote-workforce-protection-hero-2500px.jpg</image:loc><image:caption>remoteworkforceprotectionhero2500px</image:caption><image:title>remoteworkforceprotectionhero2500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE_ATTACK_logo_Lockup-black-transparent.png</image:loc><image:caption>MITREATTACKlogoLockupblacktransparent</image:caption><image:title>MITREATTACKlogoLockupblacktransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Blog-Hero-2.jpg</image:loc><image:caption>MITREBlogHero2</image:caption><image:title>MITREBlogHero2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-05-13</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/jeff-lebowitz</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jeff%20Lebowitz.png</image:loc><image:caption>JeffLebowitz</image:caption><image:title>JeffLebowitz</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Google_LinkedIn.jpg</image:loc><image:caption>GoogleLinkedIn</image:caption><image:title>GoogleLinkedIn</image:title></image:image><lastmod>2021-10-12</lastmod></url><url><loc>https://www.cybereason.com/blog/operationalize-mitre-attack-new-tidal-cyber-wave</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Oct-18-2022-04-06-18-21-PM.png</image:loc><image:caption>image2Oct18202204061821PM</image:caption><image:title>image2Oct18202204061821PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(30).png</image:loc><image:caption>blogposttext30</image:caption><image:title>blogposttext30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Oct-18-2022-04-07-12-87-PM.png</image:loc><image:caption>image1Oct18202204071287PM</image:caption><image:title>image1Oct18202204071287PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eric-sun-hs.jpg</image:loc><image:caption>ericsunhs</image:caption><image:title>ericsunhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><lastmod>2022-10-19</lastmod></url><url><loc>https://www.cybereason.com/resources/fauxpersky-credstealer-malware-masquerades-as-kaspersky-antivirus</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Behavioral-Intelligence-2.jpg</image:loc><image:caption>BehavioralIntelligence2</image:caption><image:title>BehavioralIntelligence2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-04-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/industry-comes-together-to-take-action-against-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/pymnts.com_.jpg</image:loc><image:caption>pymntscom</image:caption><image:title>pymntscom</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/modern-slavery-act-transparency-statement</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-05-18</lastmod></url><url><loc>https://www.cybereason.com/blog/ghost-in-the-machine-reconciling-ai-and-trust-in-the-connected-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Table-3.png</image:loc><image:caption>Table3</image:caption><image:title>Table3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Table-1.png</image:loc><image:caption>Table1</image:caption><image:title>Table1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Table-2.png</image:loc><image:caption>Table2</image:caption><image:title>Table2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ghost-in-the-Machine-Hero.png</image:loc><image:caption>GhostintheMachineHero</image:caption><image:title>GhostintheMachineHero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-inside-notpetya-ransomware-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(10).png</image:loc><image:caption>MaliciousLifeepisode10</image:caption><image:title>MaliciousLifeepisode10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/101%20-%20MALICIOUS%20LIFE%20(1).png</image:loc><image:caption>101MALICIOUSLIFE1</image:caption><image:title>101MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/the-company-you-keep-why-your-business-could-be-targeted-by-an-apt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(30).png</image:loc><image:caption>blogposttext30</image:caption><image:title>blogposttext30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_443899843.jpg</image:loc><image:caption>shutterstock443899843</image:caption><image:title>shutterstock443899843</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-marconi-the-maskelyne-affair</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/42%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>42MALICIOUSLIFE</image:caption><image:title>42MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-report-abusing-notepad-plugins-for-evasion-and-persistence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Sep-14-2022-05-55-03-55-PM.png</image:loc><image:caption>image9Sep14202205550355PM</image:caption><image:title>image9Sep14202205550355PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-4.jpg</image:loc><image:caption>image24</image:caption><image:title>image24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Sep-14-2022-05-47-33-20-PM.png</image:loc><image:caption>image16Sep14202205473320PM</image:caption><image:title>image16Sep14202205473320PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T103718.231.png</image:loc><image:caption>blogposttext20220914T103718231</image:caption><image:title>blogposttext20220914T103718231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-1.jpg</image:loc><image:caption>image141</image:caption><image:title>image141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Sep-14-2022-05-56-53-89-PM.png</image:loc><image:caption>image1Sep14202205565389PM</image:caption><image:title>image1Sep14202205565389PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Sep-14-2022-05-53-31-64-PM.png</image:loc><image:caption>image12Sep14202205533164PM</image:caption><image:title>image12Sep14202205533164PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Sep-14-2022-05-48-23-79-PM.png</image:loc><image:caption>image13Sep14202205482379PM</image:caption><image:title>image13Sep14202205482379PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Sep-14-2022-05-52-10-21-PM.png</image:loc><image:caption>image7Sep14202205521021PM</image:caption><image:title>image7Sep14202205521021PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Sep-14-2022-05-46-49-91-PM.png</image:loc><image:caption>image10Sep14202205464991PM</image:caption><image:title>image10Sep14202205464991PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-Sep-14-2022-05-55-35-79-PM.png</image:loc><image:caption>image18Sep14202205553579PM</image:caption><image:title>image18Sep14202205553579PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lockbit-3-blog-card.png</image:loc><image:caption>lockbit3blogcard</image:caption><image:title>lockbit3blogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Sep-14-2022-05-56-19-43-PM.png</image:loc><image:caption>image8Sep14202205561943PM</image:caption><image:title>image8Sep14202205561943PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Sep-14-2022-05-52-59-08-PM.png</image:loc><image:caption>image4Sep14202205525908PM</image:caption><image:title>image4Sep14202205525908PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-Sep-14-2022-05-49-16-11-PM.png</image:loc><image:caption>image17Sep14202205491611PM</image:caption><image:title>image17Sep14202205491611PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15.gif</image:loc><image:caption>image15</image:caption><image:title>image15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Sep-14-2022-05-54-27-89-PM.png</image:loc><image:caption>image11Sep14202205542789PM</image:caption><image:title>image11Sep14202205542789PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Sep-14-2022-05-39-34-86-PM.png</image:loc><image:caption>image3Sep14202205393486PM</image:caption><image:title>image3Sep14202205393486PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Sep-14-2022-05-51-24-82-PM.png</image:loc><image:caption>image5Sep14202205512482PM</image:caption><image:title>image5Sep14202205512482PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Sep-14-2022-05-49-55-40-PM.png</image:loc><image:caption>image6Sep14202205495540PM</image:caption><image:title>image6Sep14202205495540PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><lastmod>2022-09-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cerber-ransomware-creates-self-inflicted-canary-vaccine</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/resources/retail-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/retail-case-study-card.png</image:loc><image:caption>retailcasestudycard</image:caption><image:title>retailcasestudycard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-02-17</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-roman-seleznev-did-the-punishment-fit-the-crime</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(32).png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(1).png</image:loc><image:caption>MaliciousLifeTemplate1</image:caption><image:title>MaliciousLifeTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-newest-customer-the-gap-partnership</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/researchers-find-backdoors-bugs-in-sony-white-box-ip-cameras</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/dark_reading1.jpg</image:loc><image:caption>darkreading1</image:caption><image:title>darkreading1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-announces-300-percent-revenue-growth-in-2016</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-28.png</image:loc><image:caption>Untitleddesign28</image:caption><image:title>Untitleddesign28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-2.png</image:loc><image:caption>CybereasonBlogTemplate152</image:caption><image:title>CybereasonBlogTemplate152</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ai-potential-cybersecurity-featured.png</image:loc><image:caption>aipotentialcybersecurityfeatured</image:caption><image:title>aipotentialcybersecurityfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/eran-shitrit</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Eran-Shitrit-author.png</image:loc><image:caption>EranShitritauthor</image:caption><image:title>EranShitritauthor</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-inside-operation-flyhook-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/135%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>135MALICIOUSLIFE</image:caption><image:title>135MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ray%20Pompon.png</image:loc><image:caption>RayPompon</image:caption><image:title>RayPompon</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(2)-1.png</image:loc><image:caption>MaliciousLifeTemplate21</image:caption><image:title>MaliciousLifeTemplate21</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/yossi-naar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-861190024.jpg</image:loc><image:caption>GettyImages861190024</image:caption><image:title>GettyImages861190024</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Smart-Filtering-Blog-1.png</image:loc><image:caption>SmartFilteringBlog1</image:caption><image:title>SmartFilteringBlog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Deepfakes-Blog.jpg</image:loc><image:caption>DeepfakesBlog</image:caption><image:title>DeepfakesBlog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(22)-1.png</image:loc><image:caption>CybereasonBlogTemplate221</image:caption><image:title>CybereasonBlogTemplate221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FIN7_BadUSB.png</image:loc><image:caption>FIN7BadUSB</image:caption><image:title>FIN7BadUSB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/002a_yossi_popup.jpg</image:loc><image:caption>002ayossipopup</image:caption><image:title>002ayossipopup</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(7).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews7</image:caption><image:title>CopyofBLOGSOCIALSETNews7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(25).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews25</image:caption><image:title>CopyofBLOGSOCIALSETNews25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/macys-hacked-before-christmas</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ComputerWeekly-1.png</image:loc><image:caption>ComputerWeekly1</image:caption><image:title>ComputerWeekly1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2019-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/yahoos-potential-financial-fallout-shows-the-unexpected-impacts-of-a-data-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_194315417.jpg</image:loc><image:caption>shutterstock194315417</image:caption><image:title>shutterstock194315417</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T093119.758.png</image:loc><image:caption>blogposttext20220830T093119758</image:caption><image:title>blogposttext20220830T093119758</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cloud-detection-sysdig-featured-image.png</image:loc><image:caption>clouddetectionsysdigfeaturedimage</image:caption><image:title>clouddetectionsysdigfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/research/banking-trojan-delivered-by-lolbins-ramnit-trojan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(7).png</image:loc><image:caption>pastedimage07</image:caption><image:title>pastedimage07</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/processtree%2034.png</image:loc><image:caption>processtree34</image:caption><image:title>processtree34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(5).png</image:loc><image:caption>pastedimage05</image:caption><image:title>pastedimage05</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/two%20task%20end%20userl.png</image:loc><image:caption>twotaskenduserl</image:caption><image:title>twotaskenduserl</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/citrix.png</image:loc><image:caption>citrix</image:caption><image:title>citrix</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(3).png</image:loc><image:caption>pastedimage03</image:caption><image:title>pastedimage03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(17).png</image:loc><image:caption>pastedimage017</image:caption><image:title>pastedimage017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ramnit%20write%20to%20txt%202%20userless.png</image:loc><image:caption>ramnitwritetotxt2userless</image:caption><image:title>ramnitwritetotxt2userless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/chain%20of%20commands%20with%20words.png</image:loc><image:caption>chainofcommandswithwords</image:caption><image:title>chainofcommandswithwords</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/rwxcolor%20little.png</image:loc><image:caption>rwxcolorlittle</image:caption><image:title>rwxcolorlittle</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(16).png</image:loc><image:caption>pastedimage016</image:caption><image:title>pastedimage016</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/certutil%20decode%20-%202.png</image:loc><image:caption>certutildecode2</image:caption><image:title>certutildecode2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/for%205%20screen.png</image:loc><image:caption>for5screen</image:caption><image:title>for5screen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(6).png</image:loc><image:caption>pastedimage06</image:caption><image:title>pastedimage06</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(4).png</image:loc><image:caption>pastedimage04</image:caption><image:title>pastedimage04</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(7)%20(1).png</image:loc><image:caption>image71</image:caption><image:title>image71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(8).png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(15).png</image:loc><image:caption>pastedimage015</image:caption><image:title>pastedimage015</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/collecting%20information%20about%20the%20system.png</image:loc><image:caption>collectinginformationaboutthesystem</image:caption><image:title>collectinginformationaboutthesystem</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-60.png</image:loc><image:caption>image60</image:caption><image:title>image60</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(13).png</image:loc><image:caption>pastedimage013</image:caption><image:title>pastedimage013</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2%20ini%20files%20red.png</image:loc><image:caption>2inifilesred</image:caption><image:title>2inifilesred</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powershell%20injected.png</image:loc><image:caption>powershellinjected</image:caption><image:title>powershellinjected</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/apimon1%20scaning%20processes.png</image:loc><image:caption>apimon1scaningprocesses</image:caption><image:title>apimon1scaningprocesses</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dga%20color%20side%20by%20side%20-%20third%20version.png</image:loc><image:caption>dgacolorsidebysidethirdversion</image:caption><image:title>dgacolorsidebysidethirdversion</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/runtimecheck%20intro.png</image:loc><image:caption>runtimecheckintro</image:caption><image:title>runtimecheckintro</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/t11userl.png</image:loc><image:caption>t11userl</image:caption><image:title>t11userl</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/processtree%20with%20colors.png</image:loc><image:caption>processtreewithcolors</image:caption><image:title>processtreewithcolors</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/task.png</image:loc><image:caption>task</image:caption><image:title>task</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/delete%20and%20mz%20userl.png</image:loc><image:caption>deleteandmzuserl</image:caption><image:title>deleteandmzuserl</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(9).png</image:loc><image:caption>pastedimage09</image:caption><image:title>pastedimage09</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(7).png</image:loc><image:caption>image7</image:caption><image:title>image7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/evasion.png</image:loc><image:caption>evasion</image:caption><image:title>evasion</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/webini.png</image:loc><image:caption>webini</image:caption><image:title>webini</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200-1.png</image:loc><image:caption>pastedimage01</image:caption><image:title>pastedimage01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(14).png</image:loc><image:caption>pastedimage014</image:caption><image:title>pastedimage014</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(11).png</image:loc><image:caption>pastedimage011</image:caption><image:title>pastedimage011</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powershell%20execute%20-%203.png</image:loc><image:caption>powershellexecute3</image:caption><image:title>powershellexecute3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/screencapturefunc.png</image:loc><image:caption>screencapturefunc</image:caption><image:title>screencapturefunc</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(12).png</image:loc><image:caption>pastedimage012</image:caption><image:title>pastedimage012</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/module%20rmnsoft%20in%20cybereason.png</image:loc><image:caption>modulermnsoftincybereason</image:caption><image:title>modulermnsoftincybereason</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(1).png</image:loc><image:caption>pastedimage01</image:caption><image:title>pastedimage01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(8).png</image:loc><image:caption>pastedimage08</image:caption><image:title>pastedimage08</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/anti%20de.png</image:loc><image:caption>antide</image:caption><image:title>antide</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bitsadmin%20download%20-1.png</image:loc><image:caption>bitsadmindownload1</image:caption><image:title>bitsadmindownload1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(6)-2.png</image:loc><image:caption>image62</image:caption><image:title>image62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(5)-1.png</image:loc><image:caption>image51</image:caption><image:title>image51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NETWORK.png</image:loc><image:caption>NETWORK</image:caption><image:title>NETWORK</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(2).png</image:loc><image:caption>pastedimage02</image:caption><image:title>pastedimage02</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(10).png</image:loc><image:caption>pastedimage010</image:caption><image:title>pastedimage010</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(18).png</image:loc><image:caption>pastedimage018</image:caption><image:title>pastedimage018</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/runtime%20check.png</image:loc><image:caption>runtimecheck</image:caption><image:title>runtimecheck</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ramntask%20222222.png</image:loc><image:caption>ramntask222222</image:caption><image:title>ramntask222222</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/which-data-do-ransomware-attackers-target-for-double-extortion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-27T072602.816.png</image:loc><image:caption>blogposttext20220727T072602816</image:caption><image:title>blogposttext20220727T072602816</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template-1.png</image:loc><image:caption>CybereasonBlogTemplate1</image:caption><image:title>CybereasonBlogTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(5).png</image:loc><image:caption>ThreatAlerttemplate5</image:caption><image:title>ThreatAlerttemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><lastmod>2021-12-22</lastmod></url><url><loc>https://www.cybereason.com/blog/case-study-how-cybereason-became-a-companys-source-of-truth-for-security-incidents</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(5).png</image:loc><image:caption>ImagefromiOS5</image:caption><image:title>ImagefromiOS5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CybereasonBlogHeroTemplate</image:caption><image:title>CybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/bloggraphic-1024x391.png</image:loc><image:caption>bloggraphic1024x391</image:caption><image:title>bloggraphic1024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-hit-telecommunications-firms-in-possible-chinese-espionage-campaign-researchers-say</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC_logo.svg.png</image:loc><image:caption>CNBClogosvg</image:caption><image:title>CNBClogosvg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-its-newest-customer-lewis-silkin-llp</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-09-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-health-agency-suffers-cyberattack-amid-covid-19-outbreak</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict-Logo-11.jpg</image:loc><image:caption>VerdictLogo11</image:caption><image:title>VerdictLogo11</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-raises-4.6m-in-series-a-funding</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/finsmes.jpg</image:loc><image:caption>finsmes</image:caption><image:title>finsmes</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/google-cybereason-collaboration-promises-proactive-automated-threat-detection-and-elimination</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Silicon%20Angle%20logo.png</image:loc><image:caption>SiliconAnglelogo</image:caption><image:title>SiliconAnglelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-11-10</lastmod></url><url><loc>https://www.cybereason.com/services/managed-detection-response-mdr</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/cr-mdr-mobile-app-screens-min.png</image:loc><image:caption>crmdrmobileappscreensmin</image:caption><image:title>crmdrmobileappscreensmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/Mib-mobile.png</image:loc><image:caption>Mibmobile</image:caption><image:title>Mibmobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/COST_SAVINGS_CR_ICONS_BATCH_2%20copy-15.svg</image:loc><image:caption>COSTSAVINGSCRICONSBATCH2copy15</image:caption><image:title>COSTSAVINGSCRICONSBATCH2copy15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MDR_Header-1.jpg</image:loc><image:caption>MDRHeader1</image:caption><image:title>MDRHeader1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/RESPOND_REMEDIATION_CR_ICONS-12.png</image:loc><image:caption>RESPONDREMEDIATIONCRICONS12</image:caption><image:title>RESPONDREMEDIATIONCRICONS12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/QUESTION_CHECKMARK_CR_ICONS-42.svg</image:loc><image:caption>QUESTIONCHECKMARKCRICONS42</image:caption><image:title>QUESTIONCHECKMARKCRICONS42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-mdr-datasheet-cover.png</image:loc><image:caption>crmdrdatasheetcover</image:caption><image:title>crmdrdatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISION_CR_ICONS-39.svg</image:loc><image:caption>VISIONCRICONS39</image:caption><image:title>VISIONCRICONS39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-mdr-people-process-technology-three-icon.svg.png</image:loc><image:caption>crmdrpeopleprocesstechnologythreeiconsvg</image:caption><image:title>crmdrpeopleprocesstechnologythreeiconsvg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/STOPS_THREATS_CR_ICONS-50.svg</image:loc><image:caption>STOPSTHREATSCRICONS50</image:caption><image:title>STOPSTHREATSCRICONS50</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-ltgray-03.png</image:loc><image:caption>crbgsubtleltgray03</image:caption><image:title>crbgsubtleltgray03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-100px.png</image:loc><image:caption>crchartcheckmark100px</image:caption><image:title>crchartcheckmark100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/chart-icon-dash.svg</image:loc><image:caption>charticondash</image:caption><image:title>charticondash</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-white-01.png</image:loc><image:caption>crbgsubtlewhite01</image:caption><image:title>crbgsubtlewhite01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-dkgray-05.png</image:loc><image:caption>crbgsubtledkgray05</image:caption><image:title>crbgsubtledkgray05</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-mdr-packages-comparison-thumbnail.jpg</image:loc><image:caption>crmdrpackagescomparisonthumbnail</image:caption><image:title>crmdrpackagescomparisonthumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/chart-icon-check.svg</image:loc><image:caption>charticoncheck</image:caption><image:title>charticoncheck</image:title></image:image><lastmod>2024-07-08</lastmod></url><url><loc>https://www.cybereason.com/blog/understanding-malicious-intent-requires-a-good-translator</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T071524.894.png</image:loc><image:caption>blogposttext20220707T071524894</image:caption><image:title>blogposttext20220707T071524894</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Yoav%20Orot.jpg</image:loc><image:caption>YoavOrot</image:caption><image:title>YoavOrot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_356501099-1024x391.jpg</image:loc><image:caption>shutterstock3565010991024x391</image:caption><image:title>shutterstock3565010991024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cloud-detection-sysdig-featured-image.png</image:loc><image:caption>clouddetectionsysdigfeaturedimage</image:caption><image:title>clouddetectionsysdigfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/data-privacy-day-reassessing-data-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tahawul%20Tech%20logo-3.jpg</image:loc><image:caption>TahawulTechlogo3</image:caption><image:title>TahawulTechlogo3</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-launches-advanced-ransomware-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-eventbot-android-malware-targets-nearly-300-financial-apps</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Week%20logo.png</image:loc><image:caption>SecurityWeeklogo</image:caption><image:title>SecurityWeeklogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/xmas-hacks-check-your-login-now</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Sun%20logo-2.png</image:loc><image:caption>TheSunlogo2</image:caption><image:title>TheSunlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-7357-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T112617.289.png</image:loc><image:caption>blogposttext20221003T112617289</image:caption><image:title>blogposttext20221003T112617289</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_584033554.jpg</image:loc><image:caption>shutterstock584033554</image:caption><image:title>shutterstock584033554</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-taps-osamu-yamano-as-president-of-japanese-operations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee.png</image:loc><image:caption>Employee</image:caption><image:title>Employee</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(107).png</image:loc><image:caption>blogposttext107</image:caption><image:title>blogposttext107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-announcement-blog-featured.png</image:loc><image:caption>onpremannouncementblogfeatured</image:caption><image:title>onpremannouncementblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(65).png</image:loc><image:caption>image65</image:caption><image:title>image65</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/security-news-this-week-new-android-malware-eventbot</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Wired%20logo.png</image:loc><image:caption>Wiredlogo</image:caption><image:title>Wiredlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/blog/global-law-firm-attributes-data-breach-to-compromise-at-file-sharing-provider</loc><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/data-breach-lock-blog-card.png</image:loc><image:caption>databreachlockblogcard</image:caption><image:title>databreachlockblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david-bisson-1.png</image:loc><image:caption>davidbisson1</image:caption><image:title>davidbisson1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hundreds-of-thousands-of-ip-cameras-exposed-to-iot-botnets</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/softbank-invests-100m-in-cybereason-as-cyber-cold-war-engulfs-the-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/notpetya-researchers-find-kill-switch-then-clash-over-naming</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-to-reduce-your-chances-of-getting-hit-with-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes-2.jpg</image:loc><image:caption>Forbes2</image:caption><image:title>Forbes2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-01-30</lastmod></url><url><loc>https://www.cybereason.com/blog/incident-response-dont-let-that-data-age-out</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T093119.758.png</image:loc><image:caption>blogposttext20220830T093119758</image:caption><image:title>blogposttext20220830T093119758</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/franco-hs.png</image:loc><image:caption>francohs</image:caption><image:title>francohs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/incident-response-data-aging-out-header-image.gif</image:loc><image:caption>incidentresponsedataagingoutheaderimage</image:caption><image:title>incidentresponsedataagingoutheaderimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(124).png</image:loc><image:caption>blogposttext124</image:caption><image:title>blogposttext124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/consulting/experts/devon-ackerman</loc><lastmod>2025-08-19</lastmod></url><url><loc>https://www.cybereason.com/mitre-attack-and-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-icon-mitre-analytical-coverage.svg</image:loc><image:caption>criconmitreanalyticalcoverage</image:caption><image:title>criconmitreanalyticalcoverage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-icon-mitre-protection.svg</image:loc><image:caption>criconmitreprotection</image:caption><image:title>criconmitreprotection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-texture-dark.jpg</image:loc><image:caption>crbgtexturedark</image:caption><image:title>crbgtexturedark</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-icon-mitre-visibility.svg</image:loc><image:caption>criconmitrevisibility</image:caption><image:title>criconmitrevisibility</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-icon-mitre-real-time.svg</image:loc><image:caption>criconmitrerealtime</image:caption><image:title>criconmitrerealtime</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Untitled%20presentation.png</image:loc><image:caption>Untitledpresentation</image:caption><image:title>Untitledpresentation</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-icon-mitre-config-changes.svg</image:loc><image:caption>criconmitreconfigchanges</image:caption><image:title>criconmitreconfigchanges</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20MITRE%202024%20Infographic.png</image:loc><image:caption>CybereasonMITRE2024Infographic</image:caption><image:title>CybereasonMITRE2024Infographic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/enterprise_2024_badge.png</image:loc><image:caption>enterprise2024badge</image:caption><image:title>enterprise2024badge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--secondary-white.png</image:loc><image:caption>crlogoinlinesecondarywhite</image:caption><image:title>crlogoinlinesecondarywhite</image:title></image:image><lastmod>2025-01-09</lastmod></url><url><loc>https://www.cybereason.com/blog/information-stealing-malware-targeting-brazil</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T090944.782.png</image:loc><image:caption>blogposttext20220907T090944782</image:caption><image:title>blogposttext20220907T090944782</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-61.png</image:loc><image:caption>image61</image:caption><image:title>image61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/update-your-threat-intel-or-stop-buying-pos-systems</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ai-potential-cybersecurity-featured.png</image:loc><image:caption>aipotentialcybersecurityfeatured</image:caption><image:title>aipotentialcybersecurityfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/POS-Anchor-Recap-Blog-cropped.jpg</image:loc><image:caption>POSAnchorRecapBlogcropped</image:caption><image:title>POSAnchorRecapBlogcropped</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(15)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews151</image:caption><image:title>CopyofBLOGSOCIALSETNews151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-expert-discusses-securing-the-financial-sector-now-and-into-the-future</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Intelligent%20CISO%20logo-1.jpg</image:loc><image:caption>IntelligentCISOlogo1</image:caption><image:title>IntelligentCISOlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-novel-approach-to-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/israel21c.jpg</image:loc><image:caption>israel21c</image:caption><image:title>israel21c</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-ad-fraud-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Augustine-Fou.jpg</image:loc><image:caption>AugustineFou</image:caption><image:title>AugustineFou</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ad-fraud-pt1-ep-217.png</image:loc><image:caption>adfraudpt1ep217</image:caption><image:title>adfraudpt1ep217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-the-north-korean-sideshow-why-missiles-shouldnt-be-the-only-security-concern</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-144.png</image:loc><image:caption>MaliciousLife144</image:caption><image:title>MaliciousLife144</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/dprk_flag_feature.jpg</image:loc><image:caption>dprkflagfeature</image:caption><image:title>dprkflagfeature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/136%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>136MALICIOUSLIFE</image:caption><image:title>136MALICIOUSLIFE</image:title></image:image><lastmod>2017-12-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/free-tool-detects-exploits-dll-hijacking-vulnerabilities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-solarwinds-attack-and-the-limits-of-cyber-hygiene</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-4.png</image:loc><image:caption>SCMagazinelogo4</image:caption><image:title>SCMagazinelogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-segwit2x-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/81%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>81MALICIOUSLIFE</image:caption><image:title>81MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(15).png</image:loc><image:caption>MaliciousLifeepisode15</image:caption><image:title>MaliciousLifeepisode15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-226-Card.png</image:loc><image:caption>MLEp226Card</image:caption><image:title>MLEp226Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/malwareless-attacks-more-advanced-ransomware-top-security-issues-in-2016</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(2).png</image:loc><image:caption>BLOGImagesTemplatev22</image:caption><image:title>BLOGImagesTemplatev22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_193801169-1024x391.gif</image:loc><image:caption>shutterstock1938011691024x391</image:caption><image:title>shutterstock1938011691024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T071524.894.png</image:loc><image:caption>blogposttext20220707T071524894</image:caption><image:title>blogposttext20220707T071524894</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/these-hackers-are-hitting-victims-with-ransomware-in-an-attempt-to-cover-their-tracks-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo-Feb-10-2022-03-37-47-13-PM.png</image:loc><image:caption>ZDNetlogoFeb10202203374713PM</image:caption><image:title>ZDNetlogoFeb10202203374713PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/raccoon-malware-as-a-service-gains-momentum</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/securityweek-5.png</image:loc><image:caption>securityweek5</image:caption><image:title>securityweek5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2019-11-05</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-accelerates-north-american-expansion-with-strategic-hires</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/we-are-hiring-owl.png</image:loc><image:caption>wearehiringowl</image:caption><image:title>wearehiringowl</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Stephan-HS.png</image:loc><image:caption>StephanHS</image:caption><image:title>StephanHS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Abigail-HS.png</image:loc><image:caption>AbigailHS</image:caption><image:title>AbigailHS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ahmed-HS.png</image:loc><image:caption>AhmedHS</image:caption><image:title>AhmedHS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(30).png</image:loc><image:caption>CybereasonBlogTemplate30</image:caption><image:title>CybereasonBlogTemplate30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-01-05</lastmod></url><url><loc>https://www.cybereason.com/blog/china-us-trade-war-cyberattack-increase</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(8)-1.png</image:loc><image:caption>CybereasonBlogTemplate81</image:caption><image:title>CybereasonBlogTemplate81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_1052256230.jpg</image:loc><image:caption>shutterstock1052256230</image:caption><image:title>shutterstock1052256230</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-06-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/security-issues-galore-with-windows-11</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes%20logo-Oct-19-2021-02-05-45-28-AM.png</image:loc><image:caption>ForbeslogoOct19202102054528AM</image:caption><image:title>ForbeslogoOct19202102054528AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-10-19</lastmod></url><url><loc>https://www.cybereason.com/blog/sc-awards-europe-cybereason-named-finalist-for-best-endpoint-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5).png</image:loc><image:caption>CybereasonBlogTemplate5</image:caption><image:title>CybereasonBlogTemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-may-19th-live-attack-simulation-xdr-vs.-modern-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eric-sun-headshot.png</image:loc><image:caption>ericsunheadshot</image:caption><image:title>ericsunheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ken_headshot.png</image:loc><image:caption>Kenheadshot</image:caption><image:title>Kenheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(95).png</image:loc><image:caption>blogposttext95</image:caption><image:title>blogposttext95</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(113).png</image:loc><image:caption>blogposttext113</image:caption><image:title>blogposttext113</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-05-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-fingers-north-korea-for-wannacry-epidemic</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ect-news-network.png</image:loc><image:caption>ectnewsnetwork</image:caption><image:title>ectnewsnetwork</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-why-relationships-matter-if-you-want-to-elevate-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mark-Weatherford%202.jpg</image:loc><image:caption>MarkWeatherford2</image:caption><image:title>MarkWeatherford2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template%20(7).png</image:loc><image:caption>CISOStoriesTemplate7</image:caption><image:title>CISOStoriesTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-1.png</image:loc><image:caption>CISOStoriestemplate71</image:caption><image:title>CISOStoriestemplate71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Todd%20F.jpg</image:loc><image:caption>ToddF</image:caption><image:title>ToddF</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/adware-maker-tries-to-intimidate-security-firm-with-cease-and-desist-letters</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Bleeping-Computer1.png</image:loc><image:caption>BleepingComputer1</image:caption><image:title>BleepingComputer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-partners-with-moviri-to-deliver-operation-centric-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-11-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-finding-microsoft-sysinternals-is-prone-to-false-negatives-when-testing-for-escalation-of-privileges</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/infosec_island.png</image:loc><image:caption>infosecisland</image:caption><image:title>infosecisland</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/eu-proposes-a-joint-cyber-incident-coordination-framework</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Govinfosecurity.com%20logo-Feb-03-2022-01-54-07-58-AM.jpg</image:loc><image:caption>GovinfosecuritycomlogoFeb03202201540758AM</image:caption><image:title>GovinfosecuritycomlogoFeb03202201540758AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-02-03</lastmod></url><url><loc>https://www.cybereason.com/blog/10-ways-to-make-your-security-operations-more-efficient</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T065715.064.png</image:loc><image:caption>blogposttext20221006T065715064</image:caption><image:title>blogposttext20221006T065715064</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(81).png</image:loc><image:caption>blogposttext81</image:caption><image:title>blogposttext81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-cranford-author.png</image:loc><image:caption>jjcranfordauthor</image:caption><image:title>jjcranfordauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-yellow-bg--top-badge.png</image:loc><image:caption>crlogoyellowbgtopbadge</image:caption><image:title>crlogoyellowbgtopbadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T125306.964.png</image:loc><image:caption>blogposttext20221003T125306964</image:caption><image:title>blogposttext20221003T125306964</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WP_Overcoming_Alert_Fatigue_with_Cybereason_final_Page_01.png</image:loc><image:caption>WPOvercomingAlertFatiguewithCybereasonfinalPage01</image:caption><image:title>WPOvercomingAlertFatiguewithCybereasonfinalPage01</image:title></image:image><lastmod>2022-10-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-russian-propaganda-explained-b-side</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt1-ep-210.png</image:loc><image:caption>lawrenceberkelehackpt1ep210</image:caption><image:title>lawrenceberkelehackpt1ep210</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/russian-fake-news-explained-mlbside-ep-209.png</image:loc><image:caption>russianfakenewsexplainedmlbsideep209</image:caption><image:title>russianfakenewsexplainedmlbsideep209</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Bilyana_Lilly-400x400-1.jpg</image:loc><image:caption>BilyanaLilly400x4001</image:caption><image:title>BilyanaLilly400x4001</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/north-korea-denies-role-in-wannacry-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/TheHill-1.png</image:loc><image:caption>TheHill1</image:caption><image:title>TheHill1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/resources/cybereason-researcher-discovers-vaccine-for-bad-rabbit-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/oliver-cole-112206-1.jpg</image:loc><image:caption>olivercole1122061</image:caption><image:title>olivercole1122061</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/capital-one-breach-what-was-stolen-in-the-mega-hack-and-how</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict-Logo-7.jpg</image:loc><image:caption>VerdictLogo7</image:caption><image:title>VerdictLogo7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2019-07-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-phishing-campaign-targeting-us-tax-return-payers-ahead-of-2021-deadline</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSN%20logo-4.png</image:loc><image:caption>MSNlogo4</image:caption><image:title>MSNlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-03-18</lastmod></url><url><loc>https://www.cybereason.com/blog/the-post-breach-challenge-the-scarcity-of-proactive-hunters</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/cyber-hunting-banner-1024x391.png</image:loc><image:caption>cyberhuntingbanner1024x391</image:caption><image:title>cyberhuntingbanner1024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-03T064719.647.png</image:loc><image:caption>blogposttext20220803T064719647</image:caption><image:title>blogposttext20220803T064719647</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-02T094421.274.png</image:loc><image:caption>blogposttext20220602T094421274</image:caption><image:title>blogposttext20220602T094421274</image:title></image:image><lastmod>2018-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/thoughts-about-the-uber-breach-disclosure</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3)-2.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews32</image:caption><image:title>CopyofBLOGSOCIALSETNews32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(15).png</image:loc><image:caption>blogposttext15</image:caption><image:title>blogposttext15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/636247599789125010-1013090754_Uber-pic-1.jpg</image:loc><image:caption>6362475997891250101013090754Uberpic1</image:caption><image:title>6362475997891250101013090754Uberpic1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><lastmod>2017-12-15</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-attacks-are-evolving-what-you-need-to-know</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(75).png</image:loc><image:caption>blogposttext75</image:caption><image:title>blogposttext75</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19).png</image:loc><image:caption>CybereasonBlogTemplate19</image:caption><image:title>CybereasonBlogTemplate19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/mitre-attck</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AI%20Hunting%20Tour/Drifting%20Hero%20Assets/AIHT_Fragment_Header_BottomLayer.jpg</image:loc><image:caption>AIHTFragmentHeaderBottomLayer</image:caption><image:title>AIHTFragmentHeaderBottomLayer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-suggested-images/www.cybereason.comhs-fshubfsMitre_Att&amp;ck_Coverage_Light.png</image:loc><image:caption>wwwcybereasoncomhsfshubfsMitreAttckCoverageLight</image:caption><image:title>wwwcybereasoncomhsfshubfsMitreAttckCoverageLight</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Split_1920x1080.jpg</image:loc><image:caption>Split1920x1080</image:caption><image:title>Split1920x1080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mitre_Correlation_Light.png</image:loc><image:caption>MitreCorrelationLight</image:caption><image:title>MitreCorrelationLight</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-suggested-images/www.cybereason.comhs-fshubfsMitre_Alerts_Light.png</image:loc><image:caption>wwwcybereasoncomhsfshubfsMitreAlertsLight</image:caption><image:title>wwwcybereasoncomhsfshubfsMitreAlertsLight</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202019-02-21%20at%208.39.11%20AM.png</image:loc><image:caption>ScreenShot20190221at83911AM</image:caption><image:title>ScreenShot20190221at83911AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-04-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/govt-faces-call-to-boost-headless-cyber-risk-framework</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/FTAdviser.png</image:loc><image:caption>FTAdviser</image:caption><image:title>FTAdviser</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/7-requirements-for-a-successful-xdr-strategy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(41).png</image:loc><image:caption>blogposttext41</image:caption><image:title>blogposttext41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10XFaster.png</image:loc><image:caption>10XFaster</image:caption><image:title>10XFaster</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/7-requirements-for-xdr.png</image:loc><image:caption>7requirementsforxdr</image:caption><image:title>7requirementsforxdr</image:title></image:image><lastmod>2023-01-19</lastmod></url><url><loc>https://www.cybereason.com/blog/an-introduction-to-cyber-hunting-10-immediate-actions-for-a-post-breach-reality</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/null-1.png</image:loc><image:caption>null1</image:caption><image:title>null1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/button-2.png</image:loc><image:caption>button2</image:caption><image:title>button2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-DJvu-variant-featured-image.png</image:loc><image:caption>threatalertDJvuvariantfeaturedimage</image:caption><image:title>threatalertDJvuvariantfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/anydesk-breach-blog-featured.png</image:loc><image:caption>anydeskbreachblogfeatured</image:caption><image:title>anydeskbreachblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-12-18</lastmod></url><url><loc>https://www.cybereason.com/ransomware-range-roadshow</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cityscapes/750px/miami-min.jpg</image:loc><image:caption>miamimin</image:caption><image:title>miamimin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cityscapes/750px/detroit-min.jpg</image:loc><image:caption>detroitmin</image:caption><image:title>detroitmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cityscapes/750px/phoenix-min.jpg</image:loc><image:caption>phoenixmin</image:caption><image:title>phoenixmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cityscapes/750px/seattle-min.jpg</image:loc><image:caption>seattlemin</image:caption><image:title>seattlemin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cityscapes/750px/pittsburgh-min.jpg</image:loc><image:caption>pittsburghmin</image:caption><image:title>pittsburghmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cityscapes/750px/nyc-min.jpg</image:loc><image:caption>nycmin</image:caption><image:title>nycmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cityscapes/750px/denver-min.jpg</image:loc><image:caption>denvermin</image:caption><image:title>denvermin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cityscapes/750px/san%20fran-min.jpg</image:loc><image:caption>sanfranmin</image:caption><image:title>sanfranmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ransomware-range--featured-v2.jpg</image:loc><image:caption>ransomwarerangefeaturedv2</image:caption><image:title>ransomwarerangefeaturedv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cityscapes/750px/atlanta-min.jpg</image:loc><image:caption>atlantamin</image:caption><image:title>atlantamin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cityscapes/750px/houston-min.jpg</image:loc><image:caption>houstonmin</image:caption><image:title>houstonmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cityscapes/750px/chicago-min.jpg</image:loc><image:caption>chicagomin</image:caption><image:title>chicagomin</image:title></image:image><lastmod>2022-09-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinese-likely-behind-worldwide-attacks-on-telecommunications-providers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/fox-news-logo.jpg</image:loc><image:caption>foxnewslogo</image:caption><image:title>foxnewslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-06-27</lastmod></url><url><loc>https://www.cybereason.com/blog/defending-against-the-fileless-malware-pandemic-thats-infecting-banks-around-the-globe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blank-avatar.png</image:loc><image:caption>blankavatar</image:caption><image:title>blankavatar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_360442766-1.jpg</image:loc><image:caption>shutterstock3604427661</image:caption><image:title>shutterstock3604427661</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/resources/mitre-attack-and-cybereason/webinar/us/061622</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/mitre-2022-results-card.png</image:loc><image:caption>mitre2022resultscard</image:caption><image:title>mitre2022resultscard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-06-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/crypto-carnage-as-800-new-coins-are-dead-and-bitcoin-plunges-yet-again</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Metro_logo_black_2014.svg.png</image:loc><image:caption>Metrologoblack2014svg</image:caption><image:title>Metrologoblack2014svg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-07-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/feedback-friday-is-north-korea-behind-the-sony-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/podcasts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mic-banner-add.png</image:loc><image:caption>micbanneradd</image:caption><image:title>micbanneradd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/malicious-life-card-b.png</image:loc><image:caption>maliciouslifecardb</image:caption><image:title>maliciouslifecardb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/security-all-in-card.png</image:loc><image:caption>securityallincard</image:caption><image:title>securityallincard</image:title></image:image><lastmod>2020-11-04</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-cypherpunks-who-invented-private-digital-money</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jacob-Goldstein.jpg</image:loc><image:caption>JacobGoldstein</image:caption><image:title>JacobGoldstein</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(32).png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(14).png</image:loc><image:caption>MaliciousLifeepisode14</image:caption><image:title>MaliciousLifeepisode14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/sony-bmg-rootkit-ep-218.png</image:loc><image:caption>sonybmgrootkitep218</image:caption><image:title>sonybmgrootkitep218</image:title></image:image><lastmod>2022-06-27</lastmod></url><url><loc>https://www.cybereason.com/blog/category/resources</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(43).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews43</image:caption><image:title>CopyofBLOGSOCIALSETNews43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Campaign%20Targeting%20US%20Taxpayers.png</image:loc><image:caption>CampaignTargetingUSTaxpayers</image:caption><image:title>CampaignTargetingUSTaxpayers</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(105)-1.png</image:loc><image:caption>blogposttext1051</image:caption><image:title>blogposttext1051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/esg-xdr-hero-01.png</image:loc><image:caption>esgxdrhero01</image:caption><image:title>esgxdrhero01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDRTesting-blog.png</image:loc><image:caption>EDRTestingblog</image:caption><image:title>EDRTestingblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Remote_Workforce_Whitepaper_Header_2000x574.jpg</image:loc><image:caption>RemoteWorkforceWhitepaperHeader2000x574</image:caption><image:title>RemoteWorkforceWhitepaperHeader2000x574</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog_Gartner_EPP.png</image:loc><image:caption>BlogGartnerEPP</image:caption><image:title>BlogGartnerEPP</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/remote-workers-hub-blog-image.png</image:loc><image:caption>remoteworkershubblogimage</image:caption><image:title>remoteworkershubblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Symantec_LandingPage_Banner-8.png</image:loc><image:caption>SymantecLandingPageBanner8</image:caption><image:title>SymantecLandingPageBanner8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Integrating%20Endpoint%20and%20Mobile%20Device%20Security%20(1).png</image:loc><image:caption>IntegratingEndpointandMobileDeviceSecurity1</image:caption><image:title>IntegratingEndpointandMobileDeviceSecurity1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Laptop-Burning-Blog.png</image:loc><image:caption>LaptopBurningBlog</image:caption><image:title>LaptopBurningBlog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(2).png</image:loc><image:caption>CybereasonBlogtemplate2</image:caption><image:title>CybereasonBlogtemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/secops.png</image:loc><image:caption>secops</image:caption><image:title>secops</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/true%20cost%20to%20business%201200x628.png</image:loc><image:caption>truecosttobusiness1200x628</image:caption><image:title>truecosttobusiness1200x628</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RansomwareDecoded-blog.png</image:loc><image:caption>RansomwareDecodedblog</image:caption><image:title>RansomwareDecodedblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Remote-Work-Illus-Blog-A.jpg</image:loc><image:caption>RemoteWorkIllusBlogA</image:caption><image:title>RemoteWorkIllusBlogA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/wipro-blog-card-final.png</image:loc><image:caption>wiproblogcardfinal</image:caption><image:title>wiproblogcardfinal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(75).png</image:loc><image:caption>blogposttext75</image:caption><image:title>blogposttext75</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/exploit-protection-blog-card.png</image:loc><image:caption>exploitprotectionblogcard</image:caption><image:title>exploitprotectionblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/fingerprint-hero-blue-green.png</image:loc><image:caption>fingerprintherobluegreen</image:caption><image:title>fingerprintherobluegreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-preventid-1500px.png</image:loc><image:caption>crowlshowcasepreventid1500px</image:caption><image:title>crowlshowcasepreventid1500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/aep-blog-hero-1.png</image:loc><image:caption>aepbloghero1</image:caption><image:title>aepbloghero1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(13).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews13</image:caption><image:title>CopyofBLOGSOCIALSETNews13</image:title></image:image><lastmod>2021-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/the-source-code-of-malicious-life</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-thamar-reservoir.png</image:loc><image:caption>MaliciousLifeepisodethamarreservoir</image:caption><image:title>MaliciousLifeepisodethamarreservoir</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/operation-ivy-bells-ep-208.png</image:loc><image:caption>operationivybellsep208</image:caption><image:title>operationivybellsep208</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2024-05-28</lastmod></url><url><loc>https://www.cybereason.com/maintaining-secure-business-continuity-with-remote-work</loc><image:image><image:loc>https://www.cybereason.com/hubfs/covid-19-webinar-hp.png</image:loc><image:caption>covid19webinarhp</image:caption><image:title>covid19webinarhp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202020-03-23%20at%202.00.21%20PM.png</image:loc><image:caption>ScreenShot20200323at20021PM</image:caption><image:title>ScreenShot20200323at20021PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/remote-workforce-protection-hero-2500px.jpg</image:loc><image:caption>remoteworkforceprotectionhero2500px</image:caption><image:title>remoteworkforceprotectionhero2500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/Dark_Gunmetal.png</image:loc><image:caption>DarkGunmetal</image:caption><image:title>DarkGunmetal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-boston-skyline-bg.jpg</image:loc><image:caption>crbostonskylinebg</image:caption><image:title>crbostonskylinebg</image:title></image:image><lastmod>2020-04-16</lastmod></url><url><loc>https://www.cybereason.com/blog/how-to-avoid-getting-hacked-at-black-hat-and-def-con</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-announcement-blog-featured.png</image:loc><image:caption>onpremannouncementblogfeatured</image:caption><image:title>onpremannouncementblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee.png</image:loc><image:caption>Employee</image:caption><image:title>Employee</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_309367385-1000x391.jpg</image:loc><image:caption>shutterstock3093673851000x391</image:caption><image:title>shutterstock3093673851000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/size-doesnt-matter-in-iot-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/131%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>131MALICIOUSLIFE</image:caption><image:title>131MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/IoTimage.jpg</image:loc><image:caption>IoTimage</image:caption><image:title>IoTimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-02-02</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-three-lingering-questions-around-the-notpetya-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20img%20lummastealer-1.png</image:loc><image:caption>blogimglummastealer1</image:caption><image:title>blogimglummastealer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(11).png</image:loc><image:caption>BLOGImagesTemplatev211</image:caption><image:title>BLOGImagesTemplatev211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/NotPetya-2.0.png</image:loc><image:caption>NotPetya20</image:caption><image:title>NotPetya20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/shutterstock_505075372-1.jpg</image:loc><image:caption>shutterstock5050753721</image:caption><image:title>shutterstock5050753721</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-01-25</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/eli-salem</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eli-salem-hs.png</image:loc><image:caption>elisalemhs</image:caption><image:title>elisalemhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/chrome-extension-campaign-madgicx</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image16.png</image:loc><image:caption>image16</image:caption><image:title>image16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image5.gif</image:loc><image:caption>image5</image:caption><image:title>image5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image13.gif</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image2.png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image17.gif</image:loc><image:caption>image17</image:caption><image:title>image17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image9.png</image:loc><image:caption>image9</image:caption><image:title>image9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image18.png</image:loc><image:caption>image18</image:caption><image:title>image18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image24.gif</image:loc><image:caption>image24</image:caption><image:title>image24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image3.png</image:loc><image:caption>image3</image:caption><image:title>image3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chrome%20Extension%20Campaign.png</image:loc><image:caption>ChromeExtensionCampaign</image:caption><image:title>ChromeExtensionCampaign</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image1.gif</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image12.png</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image19.gif</image:loc><image:caption>image19</image:caption><image:title>image19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/capability-vs-usability-blog-featured.png</image:loc><image:caption>capabilityvsusabilityblogfeatured</image:caption><image:title>capabilityvsusabilityblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image29.png</image:loc><image:caption>image29</image:caption><image:title>image29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image26.png</image:loc><image:caption>image26</image:caption><image:title>image26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image10.png</image:loc><image:caption>image10</image:caption><image:title>image10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image7.png</image:loc><image:caption>image7</image:caption><image:title>image7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image28.gif</image:loc><image:caption>image28</image:caption><image:title>image28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image6.gif</image:loc><image:caption>image6</image:caption><image:title>image6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image23.png</image:loc><image:caption>image23</image:caption><image:title>image23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/mark-tsipershtein-hs.png</image:loc><image:caption>marktsipershteinhs</image:caption><image:title>marktsipershteinhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image27.png</image:loc><image:caption>image27</image:caption><image:title>image27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image21.png</image:loc><image:caption>image21</image:caption><image:title>image21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Madgicx%20Chrome%20Extension/image11.png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><lastmod>2025-09-09</lastmod></url><url><loc>https://www.cybereason.com/blog/the-sony-breach-revealing-whos-behind-the-attack-is-impossible</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(53).png</image:loc><image:caption>blogposttext53</image:caption><image:title>blogposttext53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/taking-down-the-internet-possible-but-how-probable-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CIO_logo_300x300.png</image:loc><image:caption>CIOlogo300x300</image:caption><image:title>CIOlogo300x300</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/unmasking-secrets-the-rise-of-open-source-intelligence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Eligot-Higgins.jpg</image:loc><image:caption>EligotHiggins</image:caption><image:title>EligotHiggins</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-241-Card.png</image:loc><image:caption>MLEp241Card</image:caption><image:title>MLEp241Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-242-Card.png</image:loc><image:caption>MLEp242Card</image:caption><image:title>MLEp242Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><lastmod>2024-05-28</lastmod></url><url><loc>https://www.cybereason.com/blog/press-release-cybereason-integrates-lockheed-martin-threat-intelligence-adds-guided-remediation-to-its-detection-and-response-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/exdr-buyers-guide-23-blog-featured.png</image:loc><image:caption>exdrbuyersguide23blogfeatured</image:caption><image:title>exdrbuyersguide23blogfeatured</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/xdedic-black-market</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(30).png</image:loc><image:caption>blogposttext30</image:caption><image:title>blogposttext30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/xdedic_feature.jpg</image:loc><image:caption>xdedicfeature</image:caption><image:title>xdedicfeature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/press/eguardian-and-cybereason-partner-to-protect-organisations-from-sophisticated-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-02-14</lastmod></url><url><loc>https://www.cybereason.com/blog/why-be-daring</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(38).png</image:loc><image:caption>blogposttext38</image:caption><image:title>blogposttext38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20-%20Emmy%20Linder.png</image:loc><image:caption>CybereasonEmmyLinder</image:caption><image:title>CybereasonEmmyLinder</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog_BestinBoston.png</image:loc><image:caption>BlogBestinBoston</image:caption><image:title>BlogBestinBoston</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IWD%20blog%20(1).png</image:loc><image:caption>IWDblog1</image:caption><image:title>IWDblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EmmyLinder%20Headshot%202018%20v3.jpg</image:loc><image:caption>EmmyLinderHeadshot2018v3</image:caption><image:title>EmmyLinderHeadshot2018v3</image:title></image:image><lastmod>2021-03-12</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-observe-launch-a-new-sdr-solution</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sdr%20press-1.png</image:loc><image:caption>sdrpress1</image:caption><image:title>sdrpress1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-03-25</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-partners-with-ensign-to-provide-managed-detection-and-response-services-in-apac</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SYNNEX3%20(4).png</image:loc><image:caption>SYNNEX34</image:caption><image:title>SYNNEX34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason-Logo-no-text-dark-gray-128x128.png</image:loc><image:caption>CybereasonLogonotextdarkgray128x128</image:caption><image:title>CybereasonLogonotextdarkgray128x128</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/blog/u.s.-national-cybersecurity-strategy-at-an-inflection-point</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Future%20SOC%20Effectiveness.png</image:loc><image:caption>FutureSOCEffectiveness</image:caption><image:title>FutureSOCEffectiveness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/7-requirements-for-xdr.png</image:loc><image:caption>7requirementsforxdr</image:caption><image:title>7requirementsforxdr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Biden-cybersecurity-strategy.png</image:loc><image:caption>Bidencybersecuritystrategy</image:caption><image:title>Bidencybersecuritystrategy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><lastmod>2023-03-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/valak-2.0-the-malware-loader-turned-information-stealer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Daily%20Swig%20logo.png</image:loc><image:caption>TheDailySwiglogo</image:caption><image:title>TheDailySwiglogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-05-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/these-hackers-are-hitting-victims-with-ransomware-in-an-attempt-to-cover-their-tracks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo-Feb-03-2022-01-47-02-92-AM.png</image:loc><image:caption>ZDNetlogoFeb03202201470292AM</image:caption><image:title>ZDNetlogoFeb03202201470292AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-02-03</lastmod></url><url><loc>https://www.cybereason.com/case-study/multinational-shuts-down-major-apt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason-Logo-stacked-white.png</image:loc><image:caption>CybereasonLogostackedwhite</image:caption><image:title>CybereasonLogostackedwhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CybereasonLogo_300x132.png</image:loc><image:caption>CybereasonLogo300x132</image:caption><image:title>CybereasonLogo300x132</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ezra-jeffrey-336626.jpg</image:loc><image:caption>ezrajeffrey336626</image:caption><image:title>ezrajeffrey336626</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blob.png</image:loc><image:caption>blob</image:caption><image:title>blob</image:title></image:image><lastmod>2017-10-17</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-ciso-israel-barak-talks-to-cso-online-about-how-the-linkedin-breach-spawned-secondary-compromises</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-DJvu-variant-featured-image.png</image:loc><image:caption>threatalertDJvuvariantfeaturedimage</image:caption><image:title>threatalertDJvuvariantfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(8).png</image:loc><image:caption>BLOGImagesTemplatev28</image:caption><image:title>BLOGImagesTemplatev28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_162619025-1000x391.jpg</image:loc><image:caption>shutterstock1626190251000x391</image:caption><image:title>shutterstock1626190251000x391</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-hackers-breached-it-company-solarwinds-and-staged-an-unprecedented-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Business%20Insider%20Logo-Dec-21-2020-01-30-35-65-AM.png</image:loc><image:caption>BusinessInsiderLogoDec21202001303565AM</image:caption><image:title>BusinessInsiderLogoDec21202001303565AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/new-cybereason-incident-response-and-professional-services-bundles-include-unlimited-support</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/services-bundles-chart.png</image:loc><image:caption>servicesbundleschart</image:caption><image:title>servicesbundleschart</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(100).png</image:loc><image:caption>blogposttext100</image:caption><image:title>blogposttext100</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T072538.395.png</image:loc><image:caption>blogposttext20220920T072538395</image:caption><image:title>blogposttext20220920T072538395</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zerotrust.png</image:loc><image:caption>zerotrust</image:caption><image:title>zerotrust</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-05-10</lastmod></url><url><loc>https://www.cybereason.com/blog/the-cybersecurity-capability-the-industry-nearly-forgot</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/elephants-mini-cooper.png</image:loc><image:caption>elephantsminicooper</image:caption><image:title>elephantsminicooper</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/smartest-cybersecurity-minds-2024-blog-featured.png</image:loc><image:caption>smartestcybersecurityminds2024blogfeatured</image:caption><image:title>smartestcybersecurityminds2024blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Cybersecurity-Capability-Industry-Nearly-Forgot.png</image:loc><image:caption>CybersecurityCapabilityIndustryNearlyForgot</image:caption><image:title>CybersecurityCapabilityIndustryNearlyForgot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1)-1.png</image:loc><image:caption>BLOGPOST11</image:caption><image:title>BLOGPOST11</image:title></image:image><lastmod>2024-10-16</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/trump-administration-wants-to-make-it-easier-for-the-u.s.-to-launch-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Vice%20News.png</image:loc><image:caption>ViceNews</image:caption><image:title>ViceNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2018-08-16</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-ciso-tips-learning-and-using-the-language-of-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-59.jpg</image:loc><image:caption>Untitleddesign59</image:caption><image:title>Untitleddesign59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-ethereum-dao-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/38%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>38MALICIOUSLIFE</image:caption><image:title>38MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/resources/ciso-roundtable-ransomware-attacks-and-the-true-cost-to-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/ciso-stories-roundtable-on-demand.png</image:loc><image:caption>cisostoriesroundtableondemand</image:caption><image:title>cisostoriesroundtableondemand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://www.cybereason.com/blog/carbanak-cybercrime-gang-arrest</loc><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_317647181.jpg</image:loc><image:caption>shutterstock317647181</image:caption><image:title>shutterstock317647181</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-1.png</image:loc><image:caption>CybereasonBlogTemplate201</image:caption><image:title>CybereasonBlogTemplate201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-03-26</lastmod></url><url><loc>https://www.cybereason.com/blog/five-points-to-consider-when-evaluating-next-generation-endpoint-security-products</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Forrester-Cybereason-Webinar-Combined-10-14-FINAL2-960x391.jpg</image:loc><image:caption>ForresterCybereasonWebinarCombined1014FINAL2960x391</image:caption><image:title>ForresterCybereasonWebinarCombined1014FINAL2960x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-05-22</lastmod></url><url><loc>https://www.cybereason.com/blog/research/whos-hacking-the-hackers-no-honor-among-thieves</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-1.png</image:loc><image:caption>HackHackers1</image:caption><image:title>HackHackers1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-6.png</image:loc><image:caption>HackHackers6</image:caption><image:title>HackHackers6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-2.png</image:loc><image:caption>HackHackers2</image:caption><image:title>HackHackers2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-12.png</image:loc><image:caption>HackHackers12</image:caption><image:title>HackHackers12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/hacking-the-hackers-blog-header.png</image:loc><image:caption>hackingthehackersblogheader</image:caption><image:title>hackingthehackersblogheader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-10-b.png</image:loc><image:caption>HackHackers10b</image:caption><image:title>HackHackers10b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(6).png</image:loc><image:caption>ThreatAlerttemplate6</image:caption><image:title>ThreatAlerttemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-14.png</image:loc><image:caption>HackHackers14</image:caption><image:title>HackHackers14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-7-1.png</image:loc><image:caption>HackHackers71</image:caption><image:title>HackHackers71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-16.png</image:loc><image:caption>HackHackers16</image:caption><image:title>HackHackers16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-8.png</image:loc><image:caption>HackHackers8</image:caption><image:title>HackHackers8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-11.png</image:loc><image:caption>HackHackers11</image:caption><image:title>HackHackers11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-6-b-1.png</image:loc><image:caption>HackHackers6b1</image:caption><image:title>HackHackers6b1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-13.png</image:loc><image:caption>HackHackers13</image:caption><image:title>HackHackers13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-4.png</image:loc><image:caption>HackHackers4</image:caption><image:title>HackHackers4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-5.png</image:loc><image:caption>HackHackers5</image:caption><image:title>HackHackers5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-3.png</image:loc><image:caption>HackHackers3</image:caption><image:title>HackHackers3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-15.png</image:loc><image:caption>HackHackers15</image:caption><image:title>HackHackers15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hack-Hackers-9.png</image:loc><image:caption>HackHackers9</image:caption><image:title>HackHackers9</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/evilnum-group-targets-fintech-firms-with-new-python-based-rat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo.png</image:loc><image:caption>CSOMagazinelogo</image:caption><image:title>CSOMagazinelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-09-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/honda-hit-by-ransomware-attack-follows-major-2019-data-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Business%20Review%20logo.png</image:loc><image:caption>ComputerBusinessReviewlogo</image:caption><image:title>ComputerBusinessReviewlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-06-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/covid19-hospital-construction-firms-hit-by-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo.png</image:loc><image:caption>InfosecurityMagazinelogo</image:caption><image:title>InfosecurityMagazinelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/blog/why-the-zeus-malware-gang-arrest-is-important-but-only-part-of-the-solution</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-announces-the-availability-of-its-next-generation-cybereason-xdr-for-cloud-workloads</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Post%20MEA.png</image:loc><image:caption>ChannelPostMEA</image:caption><image:title>ChannelPostMEA</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-targeting-covid-vaccine-supply-chain</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Beta%20News%20logo-1.png</image:loc><image:caption>BetaNewslogo1</image:caption><image:title>BetaNewslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-12-07</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-uncovers-global-chinese-espionage-campaign-targeting-manufacturers-in-north-america-europe-and-asia</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cerber-fights-anti-ransomware-tools</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/dark_reading1.jpg</image:loc><image:caption>darkreading1</image:caption><image:title>darkreading1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-continues-rapid-expansion-across-emea-region</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-05-07</lastmod></url><url><loc>https://www.cybereason.com/consulting/experts/christopher-white</loc><lastmod>2025-08-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-bitcoin-has-fueled-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NPR%20logo-1.png</image:loc><image:caption>NPRlogo1</image:caption><image:title>NPRlogo1</image:title></image:image><lastmod>2021-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/sam-curry-explains-how-iot-hacking-can-help-car-makers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_527430952.jpg</image:loc><image:caption>shutterstock527430952</image:caption><image:title>shutterstock527430952</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(23).png</image:loc><image:caption>CybereasonBlogTemplate23</image:caption><image:title>CybereasonBlogTemplate23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cell-networks-hacked-by-probable-nation-state-attackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/security%20boulevard.png</image:loc><image:caption>securityboulevard</image:caption><image:title>securityboulevard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2019-07-19</lastmod></url><url><loc>https://www.cybereason.com/blog/what-are-the-spectre-and-meltdown-vulnerabilities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4).png</image:loc><image:caption>MaliciousLifeepisode4</image:caption><image:title>MaliciousLifeepisode4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV_Image-1.jpg</image:loc><image:caption>NGAVImage1</image:caption><image:title>NGAVImage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Headshot%20(1)-1.jpg</image:loc><image:caption>Headshot11</image:caption><image:title>Headshot11</image:title></image:image><lastmod>2018-01-05</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-triton-part-2-the-worlds-most-dangerous-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/68%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>68MALICIOUSLIFE</image:caption><image:title>68MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/placeholder-headshot-image.jpg</image:loc><image:caption>placeholderheadshotimage</image:caption><image:title>placeholderheadshotimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uber-admits-hiding-huge-data-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computing%20Logo.jpg</image:loc><image:caption>ComputingLogo</image:caption><image:title>ComputingLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-09</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-security-career-right-skills-right-gig</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/skill-maze-header.jpg</image:loc><image:caption>skillmazeheader</image:caption><image:title>skillmazeheader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-28T090319.905.png</image:loc><image:caption>blogposttext20220928T090319905</image:caption><image:title>blogposttext20220928T090319905</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(16).png</image:loc><image:caption>CybereasonBlogTemplate16</image:caption><image:title>CybereasonBlogTemplate16</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/nurses-demand-accurate-pay-one-month-after-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NECN%20logo-1.png</image:loc><image:caption>NECNlogo1</image:caption><image:title>NECNlogo1</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-named-a-finalist-in-info-security-products-guides-11th-annual-2015-global-excellence-awards</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Boston-Business-Journal.jpg</image:loc><image:caption>BostonBusinessJournal</image:caption><image:title>BostonBusinessJournal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/fundamentals/what-is-endpoint-detection-and-response-edr</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/101-what-is-edr-featured.png</image:loc><image:caption>101whatisedrfeatured</image:caption><image:title>101whatisedrfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/dark-metal-background.png</image:loc><image:caption>darkmetalbackground</image:caption><image:title>darkmetalbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-06-02</lastmod></url><url><loc>https://www.cybereason.com/blog/not-all-epp-security-is-the-same-changing-the-guard</loc><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v4_Page_1.png</image:loc><image:caption>BLOGImagesTemplatev4Page1</image:caption><image:title>BLOGImagesTemplatev4Page1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(37)-1.png</image:loc><image:caption>blogposttext371</image:caption><image:title>blogposttext371</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/epp-changing-of-the-guard-blog-featured.png</image:loc><image:caption>eppchangingoftheguardblogfeatured</image:caption><image:title>eppchangingoftheguardblogfeatured</image:title></image:image><lastmod>2023-10-23</lastmod></url><url><loc>https://www.cybereason.com/blog/xdr-the-key-to-higher-educations-fight-against-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(43).png</image:loc><image:caption>blogposttext43</image:caption><image:title>blogposttext43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-featured-image.png</image:loc><image:caption>crfeaturedimage</image:caption><image:title>crfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T141451.987.png</image:loc><image:caption>blogposttext20220725T141451987</image:caption><image:title>blogposttext20220725T141451987</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-a-quick-recap-on-notpetya</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/petya-banner.png</image:loc><image:caption>petyabanner</image:caption><image:title>petyabanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><lastmod>2018-01-25</lastmod></url><url><loc>https://www.cybereason.com/blog/wipro-and-cybereason-form-strategic-partnership-to-aid-global-enterprises-fight-against-advanced-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Blog-Banner_WiPro-Full-Banner-1024x300.jpg</image:loc><image:caption>BlogBannerWiProFullBanner1024x300</image:caption><image:title>BlogBannerWiProFullBanner1024x300</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-july-28th-2022-ransomware-impact-on-incident-response-strategies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(122).png</image:loc><image:caption>blogposttext122</image:caption><image:title>blogposttext122</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113218.959.png</image:loc><image:caption>blogposttext20220920T113218959</image:caption><image:title>blogposttext20220920T113218959</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/headshot_Greg%20Day.png</image:loc><image:caption>headshotGregDay</image:caption><image:title>headshotGregDay</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(126).png</image:loc><image:caption>blogposttext126</image:caption><image:title>blogposttext126</image:title></image:image><lastmod>2022-07-28</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-private-infrastructure-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/on-prem-datasheet-cover.png</image:loc><image:caption>onpremdatasheetcover</image:caption><image:title>onpremdatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2024-04-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/softbank-ups-investment-in-security-ai-firm-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/banking_technology__2x.png</image:loc><image:caption>bankingtechnology2x</image:caption><image:title>bankingtechnology2x</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-raises-200-million-to-disrupt-the-epp-market</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/edr-buyers-guide</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-21T133543.854.png</image:loc><image:caption>blogposttext20220621T133543854</image:caption><image:title>blogposttext20220621T133543854</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_382756177.jpg</image:loc><image:caption>shutterstock382756177</image:caption><image:title>shutterstock382756177</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/darkgate-featured.png</image:loc><image:caption>darkgatefeatured</image:caption><image:title>darkgatefeatured</image:title></image:image><lastmod>2018-07-09</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-tom-pageler-bitgo-bitcoin-career-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Headshot.png</image:loc><image:caption>Headshot</image:caption><image:title>Headshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(5).png</image:loc><image:caption>CISOStoriespodcast5</image:caption><image:title>CISOStoriespodcast5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/night%20of%20the%20devil-1.jpg</image:loc><image:caption>nightofthedevil1</image:caption><image:title>nightofthedevil1</image:title></image:image><lastmod>2018-08-02</lastmod></url><url><loc>https://www.cybereason.com/blog/windows-icon-display-bug</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Uri%20Sternfeld.jpeg</image:loc><image:caption>UriSternfeld</image:caption><image:title>UriSternfeld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image10.png</image:loc><image:caption>image10</image:caption><image:title>image10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(25).png</image:loc><image:caption>blogposttext25</image:caption><image:title>blogposttext25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image5.png</image:loc><image:caption>image5</image:caption><image:title>image5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image7.png</image:loc><image:caption>image7</image:caption><image:title>image7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image14.png</image:loc><image:caption>image14</image:caption><image:title>image14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image3.png</image:loc><image:caption>image3</image:caption><image:title>image3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image16.png</image:loc><image:caption>image16</image:caption><image:title>image16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-34.jpg</image:loc><image:caption>Untitleddesign34</image:caption><image:title>Untitleddesign34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image18.png</image:loc><image:caption>image18</image:caption><image:title>image18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image4.png</image:loc><image:caption>image4</image:caption><image:title>image4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image15.png</image:loc><image:caption>image15</image:caption><image:title>image15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image2.png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20tim%20weiss.png</image:loc><image:caption>EmployeeSpotlighttimweiss</image:caption><image:title>EmployeeSpotlighttimweiss</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image17.png</image:loc><image:caption>image17</image:caption><image:title>image17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image6.png</image:loc><image:caption>image6</image:caption><image:title>image6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image13.png</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image1.png</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image11.png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image12.png</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/animated.gif</image:loc><image:caption>animated</image:caption><image:title>animated</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/deep-2018-cybersecurity-conference-agenda</loc><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/background%20layers/Quote_Mark.svg</image:loc><image:caption>QuoteMark</image:caption><image:title>QuoteMark</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/LOGO-Web-Horizontal-Mono.png</image:loc><image:caption>LOGOWebHorizontalMono</image:caption><image:title>LOGOWebHorizontalMono</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/Email%20Marketing%20Images/EventBrite_Header.png</image:loc><image:caption>EventBriteHeader</image:caption><image:title>EventBriteHeader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/2018_06_06_Deep_Animation.gif</image:loc><image:caption>20180606DeepAnimation</image:caption><image:title>20180606DeepAnimation</image:title></image:image><lastmod>2018-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-want-to-cripple-your-attackers-rd-arm-look-for-them-on-your-network</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_528109945-2.jpg</image:loc><image:caption>shutterstock5281099452</image:caption><image:title>shutterstock5281099452</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sliver%20C2-1.png</image:loc><image:caption>SliverC21</image:caption><image:title>SliverC21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20img%20lummastealer-1.png</image:loc><image:caption>blogimglummastealer1</image:caption><image:title>blogimglummastealer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/resources/modern-ransomware-threats-qa-with-security-experts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Moder-Ransomware-QA-Banner-Resources.png</image:loc><image:caption>ModerRansomwareQABannerResources</image:caption><image:title>ModerRansomwareQABannerResources</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-08-04</lastmod></url><url><loc>https://www.cybereason.com/blog/on-premise-vs-cloud-based-edr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-vs-cloud-blog.png</image:loc><image:caption>onpremvscloudblog</image:caption><image:title>onpremvscloudblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T083517.794.png</image:loc><image:caption>blogposttext20220907T083517794</image:caption><image:title>blogposttext20220907T083517794</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8481.png</image:loc><image:caption>IMG8481</image:caption><image:title>IMG8481</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2024-09-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-attackers-dont-take-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITWeb%20logo-1.png</image:loc><image:caption>ITWeblogo1</image:caption><image:title>ITWeblogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-warns-global-organisations-against-ransomware-attacks-from-gang</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Intelligent%20CISO%20logo-4.jpg</image:loc><image:caption>IntelligentCISOlogo4</image:caption><image:title>IntelligentCISOlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/resources/olist-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/olist-cover-thumb-small.png</image:loc><image:caption>olistcoverthumbsmall</image:caption><image:title>olistcoverthumbsmall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2023-04-14</lastmod></url><url><loc>https://www.cybereason.com/blog/three-ransomware-attacks-that-upped-the-ante</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(20).png</image:loc><image:caption>blogposttext20</image:caption><image:title>blogposttext20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(39).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews39</image:caption><image:title>CopyofBLOGSOCIALSETNews39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-intelligence-official-warns-of-increases-in-cyber-hackings-at-februarys-winter-olympics-in-south-korea</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/is-cyber-retaliation-from-iran-imminent</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Iran-US-Blog-Image-sm.jpg</image:loc><image:caption>IranUSBlogImagesm</image:caption><image:title>IranUSBlogImagesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Defendercon_LP_no%20time.jpg</image:loc><image:caption>1200x627DefenderconLPnotime</image:caption><image:title>1200x627DefenderconLPnotime</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(12).png</image:loc><image:caption>blogposttext12</image:caption><image:title>blogposttext12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-no-honor-among-thieves</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gI_67392_Amit%20Serper%20Photo%202016.png</image:loc><image:caption>gI67392AmitSerperPhoto2016</image:caption><image:title>gI67392AmitSerperPhoto2016</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/79%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>79MALICIOUSLIFE</image:caption><image:title>79MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(4).png</image:loc><image:caption>Maliciouslifepodcast4</image:caption><image:title>Maliciouslifepodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(8).png</image:loc><image:caption>MaliciousLifeepisode8</image:caption><image:title>MaliciousLifeepisode8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/resources/extended-detection-and-response-its-past-present-and-future</loc><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Copy%20of%20Webinar%20and%20Event%20Template.png</image:loc><image:caption>CopyofCopyofWebinarandEventTemplate</image:caption><image:title>CopyofCopyofWebinarandEventTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-09-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-happened-when-security-researchers-placed-a-cni-based-honeypot-on-the-dark-web</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/forbes-logo-1.gif</image:loc><image:caption>forbeslogo1</image:caption><image:title>forbeslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2018-09-24</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-and-other-useless-security-constructs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-constructs-blog.png</image:loc><image:caption>CISOconstructsblog</image:caption><image:title>CISOconstructsblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(9).png</image:loc><image:caption>CISOStoriestemplate9</image:caption><image:title>CISOStoriestemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bob-bigman-hs-p.png</image:loc><image:caption>bobbigmanhsp</image:caption><image:title>bobbigmanhsp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><lastmod>2021-09-21</lastmod></url><url><loc>https://www.cybereason.com/get-the-xdr-toolkit</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--xdr-gradient-vertical--white.jpg</image:loc><image:caption>crbgheroxdrgradientverticalwhite</image:caption><image:title>crbgheroxdrgradientverticalwhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--xdr-gradient.jpg</image:loc><image:caption>crbgheroxdrgradient</image:caption><image:title>crbgheroxdrgradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><lastmod>2022-04-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/millions-of-facebook-user-records-including-phone-numbers-found-online</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-12.png</image:loc><image:caption>SCMagazine12</image:caption><image:title>SCMagazine12</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-kevin-mitnick-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-derrick.jpg</image:loc><image:caption>DLLSideLoadingderrick</image:caption><image:title>DLLSideLoadingderrick</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-236-card.png</image:loc><image:caption>mlep236card</image:caption><image:title>mlep236card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2024-05-28</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-nuspire-partner-to-empower-organizations-to-stop-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews11</image:caption><image:title>CopyofBLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-12</lastmod></url><url><loc>https://www.cybereason.com/resources/maintaining-secure-business-continuity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-03-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/to-pay-or-not-to-pay</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-why-do-nfts-disappear-bside</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/nfts-disappear-mlbside-ep-207.png</image:loc><image:caption>nftsdisappearmlbsideep207</image:caption><image:title>nftsdisappearmlbsideep207</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Jason-Bailey.jpeg</image:loc><image:caption>JasonBailey</image:caption><image:title>JasonBailey</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(17).png</image:loc><image:caption>MaliciousLifeepisode17</image:caption><image:title>MaliciousLifeepisode17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/other-problem-with-nfts-ep-206.png</image:loc><image:caption>otherproblemwithnftsep206</image:caption><image:title>otherproblemwithnftsep206</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-details-operation-soft-cell-a-telco-security-disaster</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Light-Reading-logo.jpg</image:loc><image:caption>LightReadinglogo</image:caption><image:title>LightReadinglogo</image:title></image:image><lastmod>2019-07-01</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-the-ciso-six-minute-rule</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(1).png</image:loc><image:caption>CISOStoriespodcast1</image:caption><image:title>CISOStoriespodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast.png</image:loc><image:caption>CISOStoriespodcast</image:caption><image:title>CISOStoriespodcast</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Renee%20Guttmann.png</image:loc><image:caption>ReneeGuttmann</image:caption><image:title>ReneeGuttmann</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(6).png</image:loc><image:caption>CISOStoriespodcast6</image:caption><image:title>CISOStoriespodcast6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-03-17</lastmod></url><url><loc>https://www.cybereason.com/consulting/experts/joel-bowers</loc><lastmod>2025-08-19</lastmod></url><url><loc>https://www.cybereason.com/blog/how-xdr-solves-key-challenges-facing-security-teams</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(80).png</image:loc><image:caption>blogposttext80</image:caption><image:title>blogposttext80</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T112612.527.png</image:loc><image:caption>blogposttext20220913T112612527</image:caption><image:title>blogposttext20220913T112612527</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T073659.457.png</image:loc><image:caption>blogposttext20220907T073659457</image:caption><image:title>blogposttext20220907T073659457</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><lastmod>2022-09-07</lastmod></url><url><loc>https://www.cybereason.com/blog/ever-evolving-tanya-janca-on-application-security-challenges</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ever-Evolving-JANCA-Cover.png</image:loc><image:caption>EverEvolvingJANCACover</image:caption><image:title>EverEvolvingJANCACover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/tanya-janca-hs.png</image:loc><image:caption>tanyajancahs</image:caption><image:title>tanyajancahs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/china-linked-winnti-apt-group-silently-stole-trade-secrets-for-years-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-4.jpg</image:loc><image:caption>SecurityWeeklogo4</image:caption><image:title>SecurityWeeklogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-announces-100-million-investment-by-softbank</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/fortune.jpg</image:loc><image:caption>fortune</image:caption><image:title>fortune</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-havanacrypt-ransomware-masquerading-as-google-update</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Aug-22-2022-06-18-20-21-PM.png</image:loc><image:caption>image1Aug22202206182021PM</image:caption><image:title>image1Aug22202206182021PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Aug-22-2022-06-25-24-81-PM.png</image:loc><image:caption>image9Aug22202206252481PM</image:caption><image:title>image9Aug22202206252481PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Aug-22-2022-06-26-21-73-PM.png</image:loc><image:caption>image14Aug22202206262173PM</image:caption><image:title>image14Aug22202206262173PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(17).png</image:loc><image:caption>BLOGImagesTemplatev217</image:caption><image:title>BLOGImagesTemplatev217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Aug-22-2022-06-23-17-46-PM.png</image:loc><image:caption>image6Aug22202206231746PM</image:caption><image:title>image6Aug22202206231746PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(125).png</image:loc><image:caption>blogposttext125</image:caption><image:title>blogposttext125</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Aug-22-2022-06-29-21-82-PM.png</image:loc><image:caption>image13Aug22202206292182PM</image:caption><image:title>image13Aug22202206292182PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Aug-22-2022-06-20-59-36-PM.png</image:loc><image:caption>image3Aug22202206205936PM</image:caption><image:title>image3Aug22202206205936PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Aug-22-2022-06-28-17-69-PM.png</image:loc><image:caption>image5Aug22202206281769PM</image:caption><image:title>image5Aug22202206281769PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Aug-22-2022-06-23-52-68-PM.png</image:loc><image:caption>image10Aug22202206235268PM</image:caption><image:title>image10Aug22202206235268PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Aug-22-2022-06-22-00-69-PM.png</image:loc><image:caption>image7Aug22202206220069PM</image:caption><image:title>image7Aug22202206220069PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T090944.782.png</image:loc><image:caption>blogposttext20220907T090944782</image:caption><image:title>blogposttext20220907T090944782</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Aug-22-2022-06-20-08-38-PM.png</image:loc><image:caption>image16Aug22202206200838PM</image:caption><image:title>image16Aug22202206200838PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Aug-22-2022-06-31-31-05-PM.png</image:loc><image:caption>image15Aug22202206313105PM</image:caption><image:title>image15Aug22202206313105PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Aug-22-2022-06-16-42-74-PM.png</image:loc><image:caption>image11Aug22202206164274PM</image:caption><image:title>image11Aug22202206164274PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Aug-22-2022-06-27-14-19-PM.png</image:loc><image:caption>image8Aug22202206271419PM</image:caption><image:title>image8Aug22202206271419PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-3.jpg</image:loc><image:caption>image23</image:caption><image:title>image23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Aug-22-2022-06-15-31-61-PM.png</image:loc><image:caption>image4Aug22202206153161PM</image:caption><image:title>image4Aug22202206153161PM</image:title></image:image><lastmod>2022-08-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/woz-ransomware-and-cybersecurity-oh-my-five-takeaways-from-cybereasons-deep-2017</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/venturefizzlogo.png</image:loc><image:caption>venturefizzlogo</image:caption><image:title>venturefizzlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/defender-spotlight-keith-barros-seton-hall-university</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(113).png</image:loc><image:caption>blogposttext113</image:caption><image:title>blogposttext113</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(95).png</image:loc><image:caption>blogposttext95</image:caption><image:title>blogposttext95</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/keith-barros.jpg</image:loc><image:caption>keithbarros</image:caption><image:title>keithbarros</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Keith-Barros-Defender-Spotlight-On-Demand-Card-1.png</image:loc><image:caption>KeithBarrosDefenderSpotlightOnDemandCard1</image:caption><image:title>KeithBarrosDefenderSpotlightOnDemandCard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/blog/how-can-the-eddie-bauer-pos-breach-help-the-security-industry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(7).png</image:loc><image:caption>CybereasonBlogTemplate7</image:caption><image:title>CybereasonBlogTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-02-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fresh-malware-targets-brazilian-e-commerce-site-users</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-3.png</image:loc><image:caption>Bankinfosecuritylogo3</image:caption><image:title>Bankinfosecuritylogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-11-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/boston-startups-combat-new-threats-in-cybersecurity-war-zone</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/conomy.jpg</image:loc><image:caption>conomy</image:caption><image:title>conomy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iran-may-retaliate-with-cyberattacks-for-soleimanis-death</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Quartz.png</image:loc><image:caption>Quartz</image:caption><image:title>Quartz</image:title></image:image><lastmod>2020-01-14</lastmod></url><url><loc>https://www.cybereason.com/blog/legos-tattoos-and-a-food-truck-cybereason-at-rsac-2016</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/FullSizeRender-1024x391.jpg</image:loc><image:caption>FullSizeRender1024x391</image:caption><image:title>FullSizeRender1024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Jordan%20Bowen.png</image:loc><image:caption>JordanBowen</image:caption><image:title>JordanBowen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/blog/why-healthcare-security-requires-an-operation-centric-approach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Healthcare%20Security%20Requires.png</image:loc><image:caption>HealthcareSecurityRequires</image:caption><image:title>HealthcareSecurityRequires</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(6)-2.png</image:loc><image:caption>CybereasonBlogTemplate62</image:caption><image:title>CybereasonBlogTemplate62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/tony-author.png</image:loc><image:caption>tonyauthor</image:caption><image:title>tonyauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T134316.545.png</image:loc><image:caption>blogposttext20220914T134316545</image:caption><image:title>blogposttext20220914T134316545</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-research-underscores-heightened-e-commerce-threats-going-into-holiday-season</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-11-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/10-emerging-cybersecurity-trends-to-watch-in-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CRN%20logo-Jan-29-2022-03-42-09-59-PM.png</image:loc><image:caption>CRNlogoJan29202203420959PM</image:caption><image:title>CRNlogoJan29202203420959PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/research/new-pervasive-worm-exploiting-linux-exim-server-vulnerability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-74.png</image:loc><image:caption>image74</image:caption><image:title>image74</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-79.png</image:loc><image:caption>image79</image:caption><image:title>image79</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-82.png</image:loc><image:caption>image82</image:caption><image:title>image82</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-71.png</image:loc><image:caption>image71</image:caption><image:title>image71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-76.png</image:loc><image:caption>image76</image:caption><image:title>image76</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-90.png</image:loc><image:caption>image90</image:caption><image:title>image90</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-88.png</image:loc><image:caption>image88</image:caption><image:title>image88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-78.png</image:loc><image:caption>image78</image:caption><image:title>image78</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-68.png</image:loc><image:caption>image68</image:caption><image:title>image68</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-84.png</image:loc><image:caption>image84</image:caption><image:title>image84</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-98.png</image:loc><image:caption>image98</image:caption><image:title>image98</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-75.png</image:loc><image:caption>image75</image:caption><image:title>image75</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-86.png</image:loc><image:caption>image86</image:caption><image:title>image86</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-73.png</image:loc><image:caption>image73</image:caption><image:title>image73</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-97.png</image:loc><image:caption>image97</image:caption><image:title>image97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-77.png</image:loc><image:caption>image77</image:caption><image:title>image77</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-89.png</image:loc><image:caption>image89</image:caption><image:title>image89</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-96.png</image:loc><image:caption>image96</image:caption><image:title>image96</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-85.png</image:loc><image:caption>image85</image:caption><image:title>image85</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-92.png</image:loc><image:caption>image92</image:caption><image:title>image92</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-94.png</image:loc><image:caption>image94</image:caption><image:title>image94</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews3</image:caption><image:title>CopyofBLOGSOCIALSETNews3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-81.png</image:loc><image:caption>image81</image:caption><image:title>image81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-93.png</image:loc><image:caption>image93</image:caption><image:title>image93</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-80.png</image:loc><image:caption>image80</image:caption><image:title>image80</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-70.png</image:loc><image:caption>image70</image:caption><image:title>image70</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-95.png</image:loc><image:caption>image95</image:caption><image:title>image95</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-69.png</image:loc><image:caption>image69</image:caption><image:title>image69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-72.png</image:loc><image:caption>image72</image:caption><image:title>image72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-83.png</image:loc><image:caption>image83</image:caption><image:title>image83</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-87.png</image:loc><image:caption>image87</image:caption><image:title>image87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/pfizer-covid-19-vaccine-data-leaked-by-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Healthcare%20IT%20News%20logo.png</image:loc><image:caption>HealthcareITNewslogo</image:caption><image:title>HealthcareITNewslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-02-04</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-do-it-internally-or-hire-a-consultant</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(5).png</image:loc><image:caption>CISOStoriespodcast5</image:caption><image:title>CISOStoriespodcast5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast.png</image:loc><image:caption>CISOStoriespodcast</image:caption><image:title>CISOStoriespodcast</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/johnia-0.jpeg</image:loc><image:caption>johnia0</image:caption><image:title>johnia0</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><lastmod>2022-02-03</lastmod></url><url><loc>https://www.cybereason.com/blog/the-sorry-state-of-apt-defense-6-security-flaws</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-06T070615.090.png</image:loc><image:caption>blogposttext20220906T070615090</image:caption><image:title>blogposttext20220906T070615090</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-19T122257.609.png</image:loc><image:caption>blogposttext20220919T122257609</image:caption><image:title>blogposttext20220919T122257609</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/weekend-ransomware-attacks-might-end-up-being-more-expensive</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BBC%20logo.png</image:loc><image:caption>BBClogo</image:caption><image:title>BBClogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/research/deadringer-exposing-chinese-threat-actors-targeting-major-telcos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-18-b.png</image:loc><image:caption>deadringerblog18b</image:caption><image:title>deadringerblog18b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-28.png</image:loc><image:caption>deadringerblog28</image:caption><image:title>deadringerblog28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/deadringer-social-02%20(1).png</image:loc><image:caption>deadringersocial021</image:caption><image:title>deadringersocial021</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-37.png</image:loc><image:caption>deadringerblog37</image:caption><image:title>deadringerblog37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-41.png</image:loc><image:caption>deadringerblog41</image:caption><image:title>deadringerblog41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-27.png</image:loc><image:caption>deadringerblog27</image:caption><image:title>deadringerblog27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-31.png</image:loc><image:caption>deadringerblog31</image:caption><image:title>deadringerblog31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews31</image:caption><image:title>CopyofBLOGSOCIALSETNews31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-14.png</image:loc><image:caption>deadringerblog14</image:caption><image:title>deadringerblog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-6.png</image:loc><image:caption>deadringerblog6</image:caption><image:title>deadringerblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-10.png</image:loc><image:caption>deadringerblog10</image:caption><image:title>deadringerblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-7-a.png</image:loc><image:caption>deadringerblog7a</image:caption><image:title>deadringerblog7a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(1)-Jul-26-2021-04-31-58-96-PM.png</image:loc><image:caption>pastedimage01Jul26202104315896PM</image:caption><image:title>pastedimage01Jul26202104315896PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-5.png</image:loc><image:caption>deadringerblog5</image:caption><image:title>deadringerblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-20-a.png</image:loc><image:caption>deadringerblog20a</image:caption><image:title>deadringerblog20a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-3.png</image:loc><image:caption>deadringerblog3</image:caption><image:title>deadringerblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-33.png</image:loc><image:caption>deadringerblog33</image:caption><image:title>deadringerblog33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-20-b.png</image:loc><image:caption>deadringerblog20b</image:caption><image:title>deadringerblog20b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-30.png</image:loc><image:caption>deadringerblog30</image:caption><image:title>deadringerblog30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-13.png</image:loc><image:caption>deadringerblog13</image:caption><image:title>deadringerblog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-34.png</image:loc><image:caption>deadringerblog34</image:caption><image:title>deadringerblog34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-18-a.png</image:loc><image:caption>deadringerblog18a</image:caption><image:title>deadringerblog18a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-25.png</image:loc><image:caption>deadringerblog25</image:caption><image:title>deadringerblog25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-timeline.jpg</image:loc><image:caption>deadringerblogtimeline</image:caption><image:title>deadringerblogtimeline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-21.png</image:loc><image:caption>deadringerblog21</image:caption><image:title>deadringerblog21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-38.png</image:loc><image:caption>deadringerblog38</image:caption><image:title>deadringerblog38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-17.png</image:loc><image:caption>deadringerblog17</image:caption><image:title>deadringerblog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-26.png</image:loc><image:caption>deadringerblog26</image:caption><image:title>deadringerblog26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/tom-fakterman-1.jpg</image:loc><image:caption>tomfakterman1</image:caption><image:title>tomfakterman1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-12.png</image:loc><image:caption>deadringerblog12</image:caption><image:title>deadringerblog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-23.png</image:loc><image:caption>deadringerblog23</image:caption><image:title>deadringerblog23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-7-b.png</image:loc><image:caption>deadringerblog7b</image:caption><image:title>deadringerblog7b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-32.png</image:loc><image:caption>deadringerblog32</image:caption><image:title>deadringerblog32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-19.png</image:loc><image:caption>deadringerblog19</image:caption><image:title>deadringerblog19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-8.png</image:loc><image:caption>deadringerblog8</image:caption><image:title>deadringerblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(2)-3.png</image:loc><image:caption>pastedimage023</image:caption><image:title>pastedimage023</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-35.png</image:loc><image:caption>deadringerblog35</image:caption><image:title>deadringerblog35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-40.png</image:loc><image:caption>deadringerblog40</image:caption><image:title>deadringerblog40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-11.png</image:loc><image:caption>deadringerblog11</image:caption><image:title>deadringerblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-7-cropped-c.png</image:loc><image:caption>deadringerblog7croppedc</image:caption><image:title>deadringerblog7croppedc</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-29.png</image:loc><image:caption>deadringerblog29</image:caption><image:title>deadringerblog29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-15.png</image:loc><image:caption>deadringerblog15</image:caption><image:title>deadringerblog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-9.png</image:loc><image:caption>deadringerblog9</image:caption><image:title>deadringerblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-39.png</image:loc><image:caption>deadringerblog39</image:caption><image:title>deadringerblog39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(9)-1.png</image:loc><image:caption>pastedimage091</image:caption><image:title>pastedimage091</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-4-cropped.png</image:loc><image:caption>deadringerblog4cropped</image:caption><image:title>deadringerblog4cropped</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-22.png</image:loc><image:caption>deadringerblog22</image:caption><image:title>deadringerblog22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-16.png</image:loc><image:caption>deadringerblog16</image:caption><image:title>deadringerblog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-36.png</image:loc><image:caption>deadringerblog36</image:caption><image:title>deadringerblog36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/deadringer-blog-24.png</image:loc><image:caption>deadringerblog24</image:caption><image:title>deadringerblog24</image:title></image:image><lastmod>2024-08-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/world-economic-forum-announces-global-centre-for-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iranian-hacking-groups-pick-up-the-pace-with-new-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Searchsecurity%20logo-2.jpg</image:loc><image:caption>Searchsecuritylogo2</image:caption><image:title>Searchsecuritylogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-02-03</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-announces-securema-initiative</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/howard-university-hit-with-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-Sep-14-2021-03-34-39-22-PM.png</image:loc><image:caption>DatabreachtodaylogoSep14202103343922PM</image:caption><image:title>DatabreachtodaylogoSep14202103343922PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-09-14</lastmod></url><url><loc>https://www.cybereason.com/blog/kovter-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(2).png</image:loc><image:caption>BLOGImagesTemplatev22</image:caption><image:title>BLOGImagesTemplatev22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/kovter_feature.jpg</image:loc><image:caption>kovterfeature</image:caption><image:title>kovterfeature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(13).png</image:loc><image:caption>BLOGImagesTemplatev213</image:caption><image:title>BLOGImagesTemplatev213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/ciso-stories-podcast</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template%20(2).png</image:loc><image:caption>CISOStoriesTemplate2</image:caption><image:title>CISOStoriesTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-Privacy-blog.png</image:loc><image:caption>CISOPrivacyblog</image:caption><image:title>CISOPrivacyblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO_51.png</image:loc><image:caption>CISO51</image:caption><image:title>CISO51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(8).png</image:loc><image:caption>CISOStoriespodcast8</image:caption><image:title>CISOStoriespodcast8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(6)-1.png</image:loc><image:caption>CISOStoriestemplate61</image:caption><image:title>CISOStoriestemplate61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20FTC%20Breach-1.png</image:loc><image:caption>CISOFTCBreach1</image:caption><image:title>CISOFTCBreach1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template-4.png</image:loc><image:caption>CISOStoriesTemplate4</image:caption><image:title>CISOStoriesTemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(3)-2.png</image:loc><image:caption>CISOStoriestemplate32</image:caption><image:title>CISOStoriestemplate32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories.png</image:loc><image:caption>CISOStories</image:caption><image:title>CISOStories</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(6).png</image:loc><image:caption>CISOStoriespodcast6</image:caption><image:title>CISOStoriespodcast6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Jul-19-2021-09-09-49-63-AM.png</image:loc><image:caption>CISOStoriestemplateJul19202109094963AM</image:caption><image:title>CISOStoriestemplateJul19202109094963AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(6).png</image:loc><image:caption>CISOStoriestemplate6</image:caption><image:title>CISOStoriestemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-Scary-blog-1.png</image:loc><image:caption>CISOScaryblog1</image:caption><image:title>CISOScaryblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template%20(2)-1.png</image:loc><image:caption>CISOStoriesTemplate21</image:caption><image:title>CISOStoriesTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%2024.png</image:loc><image:caption>CISOStories24</image:caption><image:title>CISOStories24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template%20(4).png</image:loc><image:caption>CISOStoriesTemplate4</image:caption><image:title>CISOStoriesTemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template%20(9)-1.png</image:loc><image:caption>CISOStoriesTemplate91</image:caption><image:title>CISOStoriesTemplate91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(3).png</image:loc><image:caption>CISOStoriespodcast3</image:caption><image:title>CISOStoriespodcast3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7).png</image:loc><image:caption>CISOStoriestemplate7</image:caption><image:title>CISOStoriestemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-1.png</image:loc><image:caption>CISOStoriestemplate71</image:caption><image:title>CISOStoriestemplate71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(1).png</image:loc><image:caption>CISOStoriespodcast1</image:caption><image:title>CISOStoriespodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(1).png</image:loc><image:caption>CISOStoriestemplate1</image:caption><image:title>CISOStoriestemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast.png</image:loc><image:caption>CISOStoriespodcast</image:caption><image:title>CISOStoriespodcast</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(9).png</image:loc><image:caption>CISOStoriestemplate9</image:caption><image:title>CISOStoriestemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4).png</image:loc><image:caption>CISOStoriestemplate4</image:caption><image:title>CISOStoriestemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(1)-1.png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-2.png</image:loc><image:caption>CISOStoriestemplate42</image:caption><image:title>CISOStoriestemplate42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(20).png</image:loc><image:caption>CISOStoriestemplate20</image:caption><image:title>CISOStoriestemplate20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template-2.png</image:loc><image:caption>CISOStoriesTemplate2</image:caption><image:title>CISOStoriesTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template-3.png</image:loc><image:caption>CISOStoriesTemplate3</image:caption><image:title>CISOStoriesTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-constructs-blog.png</image:loc><image:caption>CISOconstructsblog</image:caption><image:title>CISOconstructsblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-Colonoscopy-blog.png</image:loc><image:caption>CISOColonoscopyblog</image:caption><image:title>CISOColonoscopyblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(2).png</image:loc><image:caption>CISOStoriespodcast2</image:caption><image:title>CISOStoriespodcast2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(5).png</image:loc><image:caption>CISOStoriespodcast5</image:caption><image:title>CISOStoriespodcast5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ciso%20stories.png</image:loc><image:caption>cisostories</image:caption><image:title>cisostories</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(3)-1.png</image:loc><image:caption>CISOStoriestemplate31</image:caption><image:title>CISOStoriestemplate31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog.png</image:loc><image:caption>blog</image:caption><image:title>blog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories%20(1).png</image:loc><image:caption>CISOStories1</image:caption><image:title>CISOStories1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(7).png</image:loc><image:caption>CISOStoriespodcast7</image:caption><image:title>CISOStoriespodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-Simple-blog.png</image:loc><image:caption>CISOSimpleblog</image:caption><image:title>CISOSimpleblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template-1.png</image:loc><image:caption>CISOStoriesTemplate1</image:caption><image:title>CISOStoriesTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG-May-02-2021-12-53-38-65-PM.png</image:loc><image:caption>BLOGMay02202112533865PM</image:caption><image:title>BLOGMay02202112533865PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-EQ-blog.png</image:loc><image:caption>CISOEQblog</image:caption><image:title>CISOEQblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-SLED-blog.png</image:loc><image:caption>CISOSLEDblog</image:caption><image:title>CISOSLEDblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(12).png</image:loc><image:caption>CISOStoriestemplate12</image:caption><image:title>CISOStoriestemplate12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-AllIn-blog.png</image:loc><image:caption>CISOAllInblog</image:caption><image:title>CISOAllInblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-ROI-blog.png</image:loc><image:caption>CISOROIblog</image:caption><image:title>CISOROIblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template%20(7).png</image:loc><image:caption>CISOStoriesTemplate7</image:caption><image:title>CISOStoriesTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(4).png</image:loc><image:caption>CISOStoriespodcast4</image:caption><image:title>CISOStoriespodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-CareerPath-blog.png</image:loc><image:caption>CISOCareerPathblog</image:caption><image:title>CISOCareerPathblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5).png</image:loc><image:caption>CISOStoriestemplate5</image:caption><image:title>CISOStoriestemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(10)-1.png</image:loc><image:caption>CISOStoriestemplate101</image:caption><image:title>CISOStoriestemplate101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-1.png</image:loc><image:caption>CISOStoriestemplate41</image:caption><image:title>CISOStoriestemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-Magic-blog.png</image:loc><image:caption>CISOMagicblog</image:caption><image:title>CISOMagicblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast.png</image:loc><image:caption>Maliciouslifepodcast</image:caption><image:title>Maliciouslifepodcast</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(10).png</image:loc><image:caption>CISOStoriestemplate10</image:caption><image:title>CISOStoriestemplate10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(15).png</image:loc><image:caption>blogposttext15</image:caption><image:title>blogposttext15</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-is-generative-ai-dangerous</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Ben-Sawyer.jpg</image:loc><image:caption>BenSawyer</image:caption><image:title>BenSawyer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-223-Card.png</image:loc><image:caption>MLEp223Card</image:caption><image:title>MLEp223Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Briland-Hitaj.jpg</image:loc><image:caption>BrilandHitaj</image:caption><image:title>BrilandHitaj</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/placeholder-headshot-image.jpg</image:loc><image:caption>placeholderheadshotimage</image:caption><image:title>placeholderheadshotimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Gil-Gekker.jpg</image:loc><image:caption>GilGekker</image:caption><image:title>GilGekker</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Sahar-Abdelnabi.jpg</image:loc><image:caption>SaharAbdelnabi</image:caption><image:title>SaharAbdelnabi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Fernando-Perez-Cruz.jpg</image:loc><image:caption>FernandoPerezCruz</image:caption><image:title>FernandoPerezCruz</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/generative-ai-dangerous-ep-222.png</image:loc><image:caption>generativeaidangerousep222</image:caption><image:title>generativeaidangerousep222</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/microsoft-urges-business-to-act-quickly-to-as-exchange-attacks-mount</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/VentureBeat%20logo.png</image:loc><image:caption>VentureBeatlogo</image:caption><image:title>VentureBeatlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-03-10</lastmod></url><url><loc>https://www.cybereason.com/company/contact-us</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/AUTONOMOUS_PREVENTION_CR_ICONS-14.svg</image:loc><image:caption>AUTONOMOUSPREVENTIONCRICONS14</image:caption><image:title>AUTONOMOUSPREVENTIONCRICONS14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR3_CR_ICONS-22.svg</image:loc><image:caption>EDR3CRICONS22</image:caption><image:title>EDR3CRICONS22</image:title></image:image><lastmod>2026-02-13</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-the-scarab-virus</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(11)-1.png</image:loc><image:caption>CybereasonBlogTemplate111</image:caption><image:title>CybereasonBlogTemplate111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(110).png</image:loc><image:caption>blogposttext110</image:caption><image:title>blogposttext110</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-07-19</lastmod></url><url><loc>https://www.cybereason.com/blog/defending-the-retail-sector-against-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-06T123240.080.png</image:loc><image:caption>blogposttext20220706T123240080</image:caption><image:title>blogposttext20220706T123240080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(85).png</image:loc><image:caption>blogposttext85</image:caption><image:title>blogposttext85</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-02T070344.027.png</image:loc><image:caption>blogposttext20220802T070344027</image:caption><image:title>blogposttext20220802T070344027</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-08-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-gets-100m-from-softbank-to-fend-off-cyber-attacks-competitors</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/conomy.jpg</image:loc><image:caption>conomy</image:caption><image:title>conomy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/vancouvers-transit-agency-translink-suffers-disruptive-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TEISS%20logo-2.png</image:loc><image:caption>TEISSlogo2</image:caption><image:title>TEISSlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-12-07</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-security-awareness-that-actually-works</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Steve.png</image:loc><image:caption>Steve</image:caption><image:title>Steve</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/blog/who-are-the-main-targets-of-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(40).png</image:loc><image:caption>CybereasonBlogTemplate40</image:caption><image:title>CybereasonBlogTemplate40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-27T072602.816.png</image:loc><image:caption>blogposttext20220727T072602816</image:caption><image:title>blogposttext20220727T072602816</image:title></image:image><lastmod>2022-02-25</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-vs.-quantum-locker-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image7-May-09-2022-06-21-18-08-PM.png</image:loc><image:caption>image7May09202206211808PM</image:caption><image:title>image7May09202206211808PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(3).png</image:loc><image:caption>Vs3</image:caption><image:title>Vs3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-May-09-2022-06-19-36-77-PM.png</image:loc><image:caption>image3May09202206193677PM</image:caption><image:title>image3May09202206193677PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-May-09-2022-06-18-54-86-PM.png</image:loc><image:caption>image11May09202206185486PM</image:caption><image:title>image11May09202206185486PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-May-09-2022-06-22-08-61-PM.png</image:loc><image:caption>image14May09202206220861PM</image:caption><image:title>image14May09202206220861PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-May-09-2022-06-20-42-64-PM.png</image:loc><image:caption>image2May09202206204264PM</image:caption><image:title>image2May09202206204264PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-May-09-2022-06-20-13-38-PM.png</image:loc><image:caption>image9May09202206201338PM</image:caption><image:title>image9May09202206201338PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-May-09-2022-06-25-24-56-PM.png</image:loc><image:caption>image8May09202206252456PM</image:caption><image:title>image8May09202206252456PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-May-09-2022-06-24-47-32-PM.png</image:loc><image:caption>image13May09202206244732PM</image:caption><image:title>image13May09202206244732PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-May-09-2022-06-18-08-81-PM.png</image:loc><image:caption>image5May09202206180881PM</image:caption><image:title>image5May09202206180881PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-May-09-2022-06-22-36-72-PM.png</image:loc><image:caption>image6May09202206223672PM</image:caption><image:title>image6May09202206223672PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-May-09-2022-06-23-48-11-PM.png</image:loc><image:caption>image1May09202206234811PM</image:caption><image:title>image1May09202206234811PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-May-09-2022-06-24-16-74-PM.png</image:loc><image:caption>image10May09202206241674PM</image:caption><image:title>image10May09202206241674PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-May-09-2022-06-27-07-06-PM.png</image:loc><image:caption>image4May09202206270706PM</image:caption><image:title>image4May09202206270706PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/u.s.-pipeline-hackers-say-their-aim-is-cash-not-chaos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Reuters%20logo-1.png</image:loc><image:caption>Reuterslogo1</image:caption><image:title>Reuterslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-05-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-defenders-should-prepare-for-holiday-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-1.jpg</image:loc><image:caption>SecurityWeeklogo1</image:caption><image:title>SecurityWeeklogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-11-19</lastmod></url><url><loc>https://www.cybereason.com/press/malicious-life-earns-top-20-itunes-ranking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-wins-best-emerging-technology-at-sc-awards-europe-2015</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(65).png</image:loc><image:caption>blogposttext65</image:caption><image:title>blogposttext65</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/research/operation-soft-cell-a-worldwide-campaign-against-telecommunications-providers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-8.png</image:loc><image:caption>operationsoftcellblog8</image:caption><image:title>operationsoftcellblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-17.png</image:loc><image:caption>operationsoftcellblog17</image:caption><image:title>operationsoftcellblog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(88).png</image:loc><image:caption>blogposttext88</image:caption><image:title>blogposttext88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/operation-soft-cell-blog-1.jpg</image:loc><image:caption>operationsoftcellblog1</image:caption><image:title>operationsoftcellblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-22.png</image:loc><image:caption>operationsoftcellblog22</image:caption><image:title>operationsoftcellblog22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-23.png</image:loc><image:caption>operationsoftcellblog23</image:caption><image:title>operationsoftcellblog23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(1)-2.png</image:loc><image:caption>pastedimage012</image:caption><image:title>pastedimage012</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-6.png</image:loc><image:caption>operationsoftcellblog6</image:caption><image:title>operationsoftcellblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-122.png</image:loc><image:caption>image122</image:caption><image:title>image122</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-4.png</image:loc><image:caption>operationsoftcellblog4</image:caption><image:title>operationsoftcellblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-14.png</image:loc><image:caption>operationsoftcellblog14</image:caption><image:title>operationsoftcellblog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2019_07_01_TelcoAttackHistory_infographic%20(1).jpg</image:loc><image:caption>20190701TelcoAttackHistoryinfographic1</image:caption><image:title>20190701TelcoAttackHistoryinfographic1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/op-soft-cell.jpg</image:loc><image:caption>opsoftcell</image:caption><image:title>opsoftcell</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-18.png</image:loc><image:caption>operationsoftcellblog18</image:caption><image:title>operationsoftcellblog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-11.png</image:loc><image:caption>operationsoftcellblog11</image:caption><image:title>operationsoftcellblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-20.png</image:loc><image:caption>operationsoftcellblog20</image:caption><image:title>operationsoftcellblog20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(96).png</image:loc><image:caption>blogposttext96</image:caption><image:title>blogposttext96</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-13.png</image:loc><image:caption>operationsoftcellblog13</image:caption><image:title>operationsoftcellblog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-19.png</image:loc><image:caption>operationsoftcellblog19</image:caption><image:title>operationsoftcellblog19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-10.png</image:loc><image:caption>operationsoftcellblog10</image:caption><image:title>operationsoftcellblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-9.png</image:loc><image:caption>operationsoftcellblog9</image:caption><image:title>operationsoftcellblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-21.png</image:loc><image:caption>operationsoftcellblog21</image:caption><image:title>operationsoftcellblog21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-12.png</image:loc><image:caption>operationsoftcellblog12</image:caption><image:title>operationsoftcellblog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-15.png</image:loc><image:caption>operationsoftcellblog15</image:caption><image:title>operationsoftcellblog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-5.png</image:loc><image:caption>operationsoftcellblog5</image:caption><image:title>operationsoftcellblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-3.png</image:loc><image:caption>operationsoftcellblog3</image:caption><image:title>operationsoftcellblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-5.png</image:loc><image:caption>image215</image:caption><image:title>image215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-2.png</image:loc><image:caption>operationsoftcellblog2</image:caption><image:title>operationsoftcellblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-7.png</image:loc><image:caption>operationsoftcellblog7</image:caption><image:title>operationsoftcellblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/operation-soft-cell-blog-16.png</image:loc><image:caption>operationsoftcellblog16</image:caption><image:title>operationsoftcellblog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/resources/malicious-life-live-episode-multi-stage-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ML-Live-Ep-Card.png</image:loc><image:caption>MLLiveEpCard</image:caption><image:title>MLLiveEpCard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-07-31</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-receives-gold-opswat-access-control-certification-for-its-endpoint-security-products</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-10</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-named-overall-leader-in-2022-kuppingercole-leadership-compass</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20MDR%20fast%20efficient%20effective.png</image:loc><image:caption>cybereasonMDRfastefficienteffective</image:caption><image:title>cybereasonMDRfastefficienteffective</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(106).png</image:loc><image:caption>blogposttext106</image:caption><image:title>blogposttext106</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202022-05-16%20at%2013-32-07%20Endpoint%20Protection%20Detection%20&amp;%20Response.png</image:loc><image:caption>Screenshot20220516at133207EndpointProtectionDetectionResponse</image:caption><image:title>Screenshot20220516at133207EndpointProtectionDetectionResponse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason-private-infrastructure-protection-gartner-magic-quadrant.png</image:loc><image:caption>Cybereasonprivateinfrastructureprotectiongartnermagicquadrant</image:caption><image:title>Cybereasonprivateinfrastructureprotectiongartnermagicquadrant</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/indicators-of-behaviour-and-the-diminishing-value-of-iocs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IT%20Online%20logo.png</image:loc><image:caption>ITOnlinelogo</image:caption><image:title>ITOnlinelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2022-10-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-using-telecoms-like-global-spy-system</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Associated_Press_logo-3.png</image:loc><image:caption>AssociatedPresslogo3</image:caption><image:title>AssociatedPresslogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2019-06-27</lastmod></url><url><loc>https://www.cybereason.com/blog/detecting-the-unknown-protecting-against-dga-based-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-5.jpg</image:loc><image:caption>Untitleddesign5</image:caption><image:title>Untitleddesign5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/resources/mitre-attack-enterprise-evaluation-2022-results-1-pager</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/mitre-r4-1-pager-cover.png</image:loc><image:caption>mitrer41pagercover</image:caption><image:title>mitrer41pagercover</image:title></image:image><lastmod>2022-04-07</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-experts-take-center-stage-at-rsa-conference-2021</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(8).png</image:loc><image:caption>CybereasonBlogTemplate8</image:caption><image:title>CybereasonBlogTemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/how-strategic-detections-set-xdr-apart</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(15).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews15</image:caption><image:title>CopyofBLOGSOCIALSETNews15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(82).png</image:loc><image:caption>blogposttext82</image:caption><image:title>blogposttext82</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-04-20</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-stories-from-the-front-lines-of-security-leadership-accommodating-the-gray-areas-of-information-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Untitled-design-39-1.png</image:loc><image:caption>Untitleddesign391</image:caption><image:title>Untitleddesign391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_624920351.jpg</image:loc><image:caption>shutterstock624920351</image:caption><image:title>shutterstock624920351</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(4).png</image:loc><image:caption>CISOStoriespodcast4</image:caption><image:title>CISOStoriespodcast4</image:title></image:image><lastmod>2023-02-10</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/joakim-kandefelt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Joakim%20Kandefelt.png</image:loc><image:caption>JoakimKandefelt</image:caption><image:title>JoakimKandefelt</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/11-cybersecurity-startups-to-bet-your-career-on-in-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Business%20Insider%20Logo-Mar-01-2022-10-51-18-02-PM.png</image:loc><image:caption>BusinessInsiderLogoMar01202210511802PM</image:caption><image:title>BusinessInsiderLogoMar01202210511802PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uk-has-a-plan-to-corral-huawei.-but-security-concerns-linger</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Wired.png</image:loc><image:caption>Wired</image:caption><image:title>Wired</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-01-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-forecast-for-2023</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eCommerce%20Times%20logo.png</image:loc><image:caption>eCommerceTimeslogo</image:caption><image:title>eCommerceTimeslogo</image:title></image:image><lastmod>2023-02-07</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-vecozo-as-its-newest-customer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-07-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/would-these-guys-have-caught-edward-snowdens-snooping</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/upstart.jpg</image:loc><image:caption>upstart</image:caption><image:title>upstart</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/the-higher-ed-security-challenge</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Eliad%20Kimhy.jpg</image:loc><image:caption>EliadKimhy</image:caption><image:title>EliadKimhy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/From%20Scripts%20to%20Systems-%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations/BLOG_Images_Template_v2%20(28).png</image:loc><image:caption>BLOGImagesTemplatev228</image:caption><image:title>BLOGImagesTemplatev228</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/100903_hr1_2vi2494crop.png</image:loc><image:caption>100903hr12vi2494crop</image:caption><image:title>100903hr12vi2494crop</image:title></image:image><lastmod>2020-03-16</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-ibm-a-better-way-to-do-enterprise-ir</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(112).png</image:loc><image:caption>blogposttext112</image:caption><image:title>blogposttext112</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T114247.790-1.png</image:loc><image:caption>blogposttext20220913T1142477901</image:caption><image:title>blogposttext20220913T1142477901</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(68).png</image:loc><image:caption>blogposttext68</image:caption><image:title>blogposttext68</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-malop.jpg</image:loc><image:caption>cybereasonmalop</image:caption><image:title>cybereasonmalop</image:title></image:image><lastmod>2022-04-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/5-star-review-of-ransomfree</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/tech-public.png</image:loc><image:caption>techpublic</image:caption><image:title>techpublic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/returning-the-power-to-your-security-teams-with-threat-hunting</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/itproportal.png</image:loc><image:caption>itproportal</image:caption><image:title>itproportal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/north-korean-hackers-are-working-with-eastern-european-cybercriminals</loc><image:image><image:loc>https://www.cybereason.com/hubfs/reuters%20logo-2.png</image:loc><image:caption>reuterslogo2</image:caption><image:title>reuterslogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-snags-100m-from-softbank-to-mount-distribution-tech-offensive</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/The-Register-800x267.jpg</image:loc><image:caption>TheRegister800x267</image:caption><image:title>TheRegister800x267</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/gandcrab-evasive-infection-chain</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image-64.png</image:loc><image:caption>image64</image:caption><image:title>image64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-63-1.png</image:loc><image:caption>image631</image:caption><image:title>image631</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-cerner-work-to-help-health-care-organizations-face-growing-cybersecurity-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-12-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/rolling-restitution-of-computers-after-cyberattack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsday%20logo.png</image:loc><image:caption>Newsdaylogo</image:caption><image:title>Newsdaylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-10-20</lastmod></url><url><loc>https://www.cybereason.com/blog/identity-beyond-2026-incident-response-predictions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mamroe-HeadshotNew.png</image:loc><image:caption>MamroeHeadshotNew</image:caption><image:title>MamroeHeadshotNew</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jamie-Blog-Predictions.jpg</image:loc><image:caption>JamieBlogPredictions</image:caption><image:title>JamieBlogPredictions</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2026-01-12</lastmod></url><url><loc>https://www.cybereason.com/blog/linux-python-wrapper-tool-plumber</loc><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/plumber_feature.jpg</image:loc><image:caption>plumberfeature</image:caption><image:title>plumberfeature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-announces-100-million-investment-by-softbank</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-oracle-team-up-for-security-at-scale-from-the-endpoint-to-the-cloud</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(10).png</image:loc><image:caption>blogposttext10</image:caption><image:title>blogposttext10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(9).png</image:loc><image:caption>blogposttext9</image:caption><image:title>blogposttext9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/oracle-cybereason-partnership-blog-card.png</image:loc><image:caption>oraclecybereasonpartnershipblogcard</image:caption><image:title>oraclecybereasonpartnershipblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Shai.png</image:loc><image:caption>Shai</image:caption><image:title>Shai</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-alert-printnightmare-critical-vulnerability-in-windows-print-spooler</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(33).png</image:loc><image:caption>blogposttext33</image:caption><image:title>blogposttext33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-09-20-27-08-PM.png</image:loc><image:caption>unnamedSep14202109202708PM</image:caption><image:title>unnamedSep14202109202708PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-53-53-18-PM.png</image:loc><image:caption>unnamedSep14202108535318PM</image:caption><image:title>unnamedSep14202108535318PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-55-30-03-PM.png</image:loc><image:caption>unnamedSep14202108553003PM</image:caption><image:title>unnamedSep14202108553003PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(3).png</image:loc><image:caption>CopyofThreatAlertAnalysis3</image:caption><image:title>CopyofThreatAlertAnalysis3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-09-19-15-17-PM.png</image:loc><image:caption>unnamedSep14202109191517PM</image:caption><image:title>unnamedSep14202109191517PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/cyberbunker-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-244-Card.png</image:loc><image:caption>MLEp244Card</image:caption><image:title>MLEp244Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(3)-2.png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/russia-and-south-korea-targeted-by-under-the-radar-bisonal-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-2.png</image:loc><image:caption>SCMagazine2</image:caption><image:title>SCMagazine2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2018-08-13</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-launches-technology-partner-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-01-08</lastmod></url><url><loc>https://www.cybereason.com/blog/debunking-three-common-misconceptions-about-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(9).png</image:loc><image:caption>blogposttext9</image:caption><image:title>blogposttext9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(46).png</image:loc><image:caption>blogposttext46</image:caption><image:title>blogposttext46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-12T072834.369-1.png</image:loc><image:caption>blogposttext20221012T0728343691</image:caption><image:title>blogposttext20221012T0728343691</image:title></image:image><lastmod>2022-02-09</lastmod></url><url><loc>https://www.cybereason.com/blog/product/cybereason-xdr-10x-faster-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/7%20visualize%20MalOp%20story.jpg</image:loc><image:caption>7visualizeMalOpstory</image:caption><image:title>7visualizeMalOpstory</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/9%20CR%20EDR-1.jpg</image:loc><image:caption>9CREDR1</image:caption><image:title>9CREDR1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/file%20level%20response.jpg</image:loc><image:caption>filelevelresponse</image:caption><image:title>filelevelresponse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRXDR.png</image:loc><image:caption>CRXDR</image:caption><image:title>CRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(41).png</image:loc><image:caption>blogposttext41</image:caption><image:title>blogposttext41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10XFaster.png</image:loc><image:caption>10XFaster</image:caption><image:title>10XFaster</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/respond%201.jpg</image:loc><image:caption>respond1</image:caption><image:title>respond1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/c2%20network%20response.jpg</image:loc><image:caption>c2networkresponse</image:caption><image:title>c2networkresponse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/fortinet%20firewall.jpg</image:loc><image:caption>fortinetfirewall</image:caption><image:title>fortinetfirewall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-security-analysts-rate-the-bumblebee-malware-loader-as-a-critical-threat-to-organizations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-08-17</lastmod></url><url><loc>https://www.cybereason.com/blog/cyberbunker-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(2)-1.png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/the%20problem%20with%20kernel%20mode%20anti%20cheat%20software-1.png</image:loc><image:caption>theproblemwithkernelmodeanticheatsoftware1</image:caption><image:title>theproblemwithkernelmodeanticheatsoftware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><lastmod>2023-08-29</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-hires-mike-volpe-as-chief-marketing-officer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(32)-1.png</image:loc><image:caption>CybereasonBlogTemplate321</image:caption><image:title>CybereasonBlogTemplate321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/alert-fatigue-the-silent-epidemic-featured-blog.png</image:loc><image:caption>alertfatiguethesilentepidemicfeaturedblog</image:caption><image:title>alertfatiguethesilentepidemicfeaturedblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-y2k-bug-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/perry-chen.jpg</image:loc><image:caption>perrychen</image:caption><image:title>perrychen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Danny-Hillis.jpeg</image:loc><image:caption>DannyHillis</image:caption><image:title>DannyHillis</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-239-Card.png</image:loc><image:caption>MLEp239Card</image:caption><image:title>MLEp239Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><lastmod>2024-05-28</lastmod></url><url><loc>https://www.cybereason.com/blog/the-5-sessions-we-are-most-excited-for-at-virtual-black-hat-usa-2020</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blue-Purple-Vector-Dots-Black-Hat.png</image:loc><image:caption>BluePurpleVectorDotsBlackHat</image:caption><image:title>BluePurpleVectorDotsBlackHat</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(15)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews151</image:caption><image:title>CopyofBLOGSOCIALSETNews151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-2.png</image:loc><image:caption>CybereasonBlogTemplate152</image:caption><image:title>CybereasonBlogTemplate152</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/heartbleed-blamed-in-attack-on-canada-tax-agency-more-expected-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/reters.jpg</image:loc><image:caption>reters</image:caption><image:title>reters</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-to-host-webinar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-receives-it-supplier-qcd-award-from-rohm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/Cybereason-owl-07.png</image:loc><image:caption>Cybereasonowl07</image:caption><image:title>Cybereasonowl07</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2025-01-28</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-is-named-to-the-prestigious-2018-ai-100</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/why-the-north-korean-cyber-threat-shouldnt-be-ignored</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IDG%20Connect%20Logo.jpeg</image:loc><image:caption>IDGConnectLogo</image:caption><image:title>IDGConnectLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-07-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/badrabbit-ransomware-moves-to-the-u.s.-links-to-petya/notpetya-being-debated</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-named-2022-cnbc-disruptor-50-winner</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC%20logo-Jun-10-2022-02-43-30-17-AM.png</image:loc><image:caption>CNBClogoJun10202202433017AM</image:caption><image:title>CNBClogoJun10202202433017AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-06-10</lastmod></url><url><loc>https://www.cybereason.com/resources/ransomware-decoded-whitepaper</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware-decoded-cover-1.png</image:loc><image:caption>ransomwaredecodedcover1</image:caption><image:title>ransomwaredecodedcover1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2020-06-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-is-driving-the-surge-in-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-4.png</image:loc><image:caption>MSSPAlertlogo4</image:caption><image:title>MSSPAlertlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-09-22</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-achieves-100-prevention-visibility-and-real-time-protection-in-2022-mitre-engenuity-attck-evaluations-for-enterprise</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-signs-infinigate-as-distributor-for-the-dach-region</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-07-17</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-rise-of-lummastealer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/autoit%20variant.png</image:loc><image:caption>autoitvariant</image:caption><image:title>autoitvariant</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/fake%20human%20verification%20steps.png</image:loc><image:caption>fakehumanverificationsteps</image:caption><image:title>fakehumanverificationsteps</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/malicious%20JS.png</image:loc><image:caption>maliciousJS</image:caption><image:title>maliciousJS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Ralph-Villanueva.png</image:loc><image:caption>RalphVillanueva</image:caption><image:title>RalphVillanueva</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/fake%20human%20verification%20run%20command.png</image:loc><image:caption>fakehumanverificationruncommand</image:caption><image:title>fakehumanverificationruncommand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/phishing%20urls%20redirections.png</image:loc><image:caption>phishingurlsredirections</image:caption><image:title>phishingurlsredirections</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/link%20to%20mediafire.png</image:loc><image:caption>linktomediafire</image:caption><image:title>linktomediafire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/malicious%20function.png</image:loc><image:caption>maliciousfunction</image:caption><image:title>maliciousfunction</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/example%20of%20LS%20infection%20flow.png</image:loc><image:caption>exampleofLSinfectionflow</image:caption><image:title>exampleofLSinfectionflow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20img%20lummastealer-1.png</image:loc><image:caption>blogimglummastealer1</image:caption><image:title>blogimglummastealer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/elena-odier.png</image:loc><image:caption>elenaodier</image:caption><image:title>elenaodier</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/discord%20api.png</image:loc><image:caption>discordapi</image:caption><image:title>discordapi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/hema-hs.png</image:loc><image:caption>hemahs</image:caption><image:title>hemahs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(11).png</image:loc><image:caption>BLOGImagesTemplatev211</image:caption><image:title>BLOGImagesTemplatev211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/dll%20side%20loading.png</image:loc><image:caption>dllsideloading</image:caption><image:title>dllsideloading</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/LS%20autoit%20variant.png</image:loc><image:caption>LSautoitvariant</image:caption><image:title>LSautoitvariant</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/mp3tag.png</image:loc><image:caption>mp3tag</image:caption><image:title>mp3tag</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/fake%20human%20verification.png</image:loc><image:caption>fakehumanverification</image:caption><image:title>fakehumanverification</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/pdf%20decoy%20variant.png</image:loc><image:caption>pdfdecoyvariant</image:caption><image:title>pdfdecoyvariant</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/youtube%20video.png</image:loc><image:caption>youtubevideo</image:caption><image:title>youtubevideo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/browser%20extension.png</image:loc><image:caption>browserextension</image:caption><image:title>browserextension</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/github%20targeted%20pages%202.png</image:loc><image:caption>githubtargetedpages2</image:caption><image:title>githubtargetedpages2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/secondary%20powershell%20example.png</image:loc><image:caption>secondarypowershellexample</image:caption><image:title>secondarypowershellexample</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/gal-romano.jpg</image:loc><image:caption>galromano</image:caption><image:title>galromano</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/MSIRAR%20variant.png</image:loc><image:caption>MSIRARvariant</image:caption><image:title>MSIRARvariant</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/basic%20lummastealer%20infection%20flow.png</image:loc><image:caption>basiclummastealerinfectionflow</image:caption><image:title>basiclummastealerinfectionflow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/pythonw%20variant.png</image:loc><image:caption>pythonwvariant</image:caption><image:title>pythonwvariant</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(15).png</image:loc><image:caption>BLOGImagesTemplatev215</image:caption><image:title>BLOGImagesTemplatev215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/github%20message.png</image:loc><image:caption>githubmessage</image:caption><image:title>githubmessage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/github%20targeted%20pages%201.png</image:loc><image:caption>githubtargetedpages1</image:caption><image:title>githubtargetedpages1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20images%20-%20lummastealer/vulnerable%20software.png</image:loc><image:caption>vulnerablesoftware</image:caption><image:title>vulnerablesoftware</image:title></image:image><lastmod>2025-01-13</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-receives-bostinno-50-on-fire-award-and-receives-coveted-inno-blazer-for-being-a-trailblazer-in-bostons-innovation-scene-</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomops-detecting-complex-ransomware-operations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(27).png</image:loc><image:caption>blogposttext27</image:caption><image:title>blogposttext27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware.png</image:loc><image:caption>ransomware</image:caption><image:title>ransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-1.png</image:loc><image:caption>CybereasonBlogTemplate201</image:caption><image:title>CybereasonBlogTemplate201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-08-03</lastmod></url><url><loc>https://www.cybereason.com/blog/gdpr-breach-reporting-deadline-fines</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3XDR.png</image:loc><image:caption>3XDR</image:caption><image:title>3XDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/alert-fatigue-the-silent-epidemic-featured-blog.png</image:loc><image:caption>alertfatiguethesilentepidemicfeaturedblog</image:caption><image:title>alertfatiguethesilentepidemicfeaturedblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_114706588.jpg</image:loc><image:caption>shutterstock114706588</image:caption><image:title>shutterstock114706588</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-official-warns-of-hacking-at-winter-olympics</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/spore-organisations-among-most-targeted-in-the-world-by-ransomware-attacks-study-finds</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Straights%20Times%20logo-2.jpg</image:loc><image:caption>TheStraightsTimeslogo2</image:caption><image:title>TheStraightsTimeslogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-launches-newest-version-of-ransomfree-the-popular-anti-ransomware-product-being-used-by-consumers-and-small-businesses</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/rip-up-the-script-when-assembling-a-modern-security-team</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_300540401-1000x391.jpg</image:loc><image:caption>shutterstock3005404011000x391</image:caption><image:title>shutterstock3005404011000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/this-free-app-can-protect-you-from-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hacking-group-dropping-malware-via-facebook-cloud-services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-4.png</image:loc><image:caption>Bankinfosecuritylogo4</image:caption><image:title>Bankinfosecuritylogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-ai-hunting-tour</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Nocturnus/images/nocturnus-hero.jpg</image:loc><image:caption>nocturnushero</image:caption><image:title>nocturnushero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2018-09-05</lastmod></url><url><loc>https://www.cybereason.com/blog/not-all-xdr-is-created-equal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(46).png</image:loc><image:caption>blogposttext46</image:caption><image:title>blogposttext46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/XDR.png</image:loc><image:caption>XDR</image:caption><image:title>XDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-28T132844.159.png</image:loc><image:caption>blogposttext20220628T132844159</image:caption><image:title>blogposttext20220628T132844159</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-08-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/industry-reactions-to-xcodeghost-malware-feedback-friday</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/4-major-cybersecurity-risks-of-working-from-home</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Entrepreneur.png</image:loc><image:caption>Entrepreneur</image:caption><image:title>Entrepreneur</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-04-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sam-curry-offers-advice-on-how-consumers-can-avoid-scams-when-donating-money-to-help-ukrainian-citizens</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NECN%20logo-2.png</image:loc><image:caption>NECNlogo2</image:caption><image:title>NECNlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-04-03</lastmod></url><url><loc>https://www.cybereason.com/blog/coronavirus-panic-security-and-you</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(122).png</image:loc><image:caption>blogposttext122</image:caption><image:title>blogposttext122</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WFH-Blog-3-30-Banner_1.png</image:loc><image:caption>WFHBlog330Banner1</image:caption><image:title>WFHBlog330Banner1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Remote-Workforces-Blog-Image-1.png</image:loc><image:caption>RemoteWorkforcesBlogImage1</image:caption><image:title>RemoteWorkforcesBlogImage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(126).png</image:loc><image:caption>blogposttext126</image:caption><image:title>blogposttext126</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-04-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/bostons-10-biggest-tech-fundings-of-2015</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-fall-of-mt.-gox-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/41%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>41MALICIOUSLIFE</image:caption><image:title>41MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-partners-with-m.tech-to-strengthen-organizations-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(18).png</image:loc><image:caption>CybereasonBlogTemplate18</image:caption><image:title>CybereasonBlogTemplate18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(9)-1.png</image:loc><image:caption>CybereasonBlogTemplate91</image:caption><image:title>CybereasonBlogTemplate91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-03-11</lastmod></url><url><loc>https://www.cybereason.com/blog/white-paper-operation-centric-security-leveraging-indicators-of-behavior-for-early-detection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/IOBs%20paper%20image.png</image:loc><image:caption>IOBspaperimage</image:caption><image:title>IOBspaperimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(63).png</image:loc><image:caption>blogposttext63</image:caption><image:title>blogposttext63</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-09-27</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/daniel-frank</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Daniel-F-HS-1.png</image:loc><image:caption>DanielFHS1</image:caption><image:title>DanielFHS1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Campaign%20Targeting%20US%20Taxpayers.png</image:loc><image:caption>CampaignTargetingUSTaxpayers</image:caption><image:title>CampaignTargetingUSTaxpayers</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/a-guide-to-more-efficient-effective-soc-teams</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WP_Overcoming_Alert_Fatigue_with_Cybereason_final_Page_01.png</image:loc><image:caption>WPOvercomingAlertFatiguewithCybereasonfinalPage01</image:caption><image:title>WPOvercomingAlertFatiguewithCybereasonfinalPage01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/olist-cybereason-mdr.png</image:loc><image:caption>olistcybereasonmdr</image:caption><image:title>olistcybereasonmdr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20MDR%20fast%20efficient%20effective.png</image:loc><image:caption>cybereasonMDRfastefficienteffective</image:caption><image:title>cybereasonMDRfastefficienteffective</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T125306.964.png</image:loc><image:caption>blogposttext20221003T125306964</image:caption><image:title>blogposttext20221003T125306964</image:title></image:image><lastmod>2022-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/even-regular-cybercriminals-are-after-ics-networks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-1.jpg</image:loc><image:caption>DarkReadinglogo1</image:caption><image:title>DarkReadinglogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-08-16</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-expansion-with-launch-of-regional-middle-east-operations-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IntelligentCISO-2.jpg</image:loc><image:caption>IntelligentCISO2</image:caption><image:title>IntelligentCISO2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/yossi-rachman</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Yossi%20Rachman.jpg</image:loc><image:caption>YossiRachman</image:caption><image:title>YossiRachman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cyber-warfare-final.png</image:loc><image:caption>cyberwarfarefinal</image:caption><image:title>cyberwarfarefinal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-announces-newest-customer-flybe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uber-reveals-cover-hack-affecting-57m-riders-drivers-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/ABC-News.png</image:loc><image:caption>ABCNews</image:caption><image:title>ABCNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-proxynotshell-two-critical-vulnerabilities-affecting-ms-exchange</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(1).png</image:loc><image:caption>BLOGImagesTemplatev21</image:caption><image:title>BLOGImagesTemplatev21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-21T133543.854.png</image:loc><image:caption>blogposttext20220621T133543854</image:caption><image:title>blogposttext20220621T133543854</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Oct-03-2022-06-47-06-09-PM.png</image:loc><image:caption>image2Oct03202206470609PM</image:caption><image:title>image2Oct03202206470609PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-3.jpg</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-3.jpg</image:loc><image:caption>image33</image:caption><image:title>image33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T113003.246.png</image:loc><image:caption>blogposttext20221003T113003246</image:caption><image:title>blogposttext20221003T113003246</image:title></image:image><lastmod>2022-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/friend-finder-data-breach-exposes-400m-swingers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/technews.jpg</image:loc><image:caption>technews</image:caption><image:title>technews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-hunting-from-lolbins-to-your-crown-jewels</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Mar-04-2022-05-03-25-11-PM.png</image:loc><image:caption>image5Mar04202205032511PM</image:caption><image:title>image5Mar04202205032511PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Mar-04-2022-05-04-55-35-PM.png</image:loc><image:caption>image4Mar04202205045535PM</image:caption><image:title>image4Mar04202205045535PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Mar-04-2022-05-02-39-45-PM.png</image:loc><image:caption>image3Mar04202205023945PM</image:caption><image:title>image3Mar04202205023945PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lockbit-3-blog-card.png</image:loc><image:caption>lockbit3blogcard</image:caption><image:title>lockbit3blogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Mar-04-2022-05-00-14-29-PM.png</image:loc><image:caption>image1Mar04202205001429PM</image:caption><image:title>image1Mar04202205001429PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(40).png</image:loc><image:caption>blogposttext40</image:caption><image:title>blogposttext40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-2.jpg</image:loc><image:caption>image62</image:caption><image:title>image62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T103718.231.png</image:loc><image:caption>blogposttext20220914T103718231</image:caption><image:title>blogposttext20220914T103718231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Mar-04-2022-05-04-00-50-PM.png</image:loc><image:caption>image2Mar04202205040050PM</image:caption><image:title>image2Mar04202205040050PM</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-launches-new-military-grade-security-services-offering</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-28</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-researchers-discover-elaborate-hacking-operation-targeting-japanese-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/09132017_feature_image.jpg</image:loc><image:caption>09132017featureimage</image:caption><image:title>09132017featureimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-propaganda</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/11%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>11MALICIOUSLIFE1</image:caption><image:title>11MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(21).png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/samanth-subramanian-a.jpeg</image:loc><image:caption>samanthsubramaniana</image:caption><image:title>samanthsubramaniana</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-exposes-iranian-state-sponsored-cyber-espionage-campaign-targeting-global-aerospace-and-telecommunications-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-exposes-chinese-threat-actors-that-compromise-telecommunication-providers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Calcalist%20logo-3.png</image:loc><image:caption>Calcalistlogo3</image:caption><image:title>Calcalistlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-08-04</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/cybereason-nocturnus-ir</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(6).png</image:loc><image:caption>ThreatAlerttemplate6</image:caption><image:title>ThreatAlerttemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iranian-apt-group-uses-previously-undocumented-trojan-for-destructive-access-to-organizations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-4.png</image:loc><image:caption>CSOMagazinelogo4</image:caption><image:title>CSOMagazinelogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/resources/operation-soft-cell-webinar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10.jpg</image:loc><image:caption>image10</image:caption><image:title>image10</image:title></image:image><lastmod>2019-07-10</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-without-building-a-ciso-eq-you-may-be-on-your-own</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-EQ-blog.png</image:loc><image:caption>CISOEQblog</image:caption><image:title>CISOEQblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/marci-mccarthy-hs.png</image:loc><image:caption>marcimccarthyhs</image:caption><image:title>marcimccarthyhs</image:title></image:image><lastmod>2021-09-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/dont-fall-for-this-fake-amazon-gift-card-offer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Kim%20Komando%20logo.jpg</image:loc><image:caption>KimKomandologo</image:caption><image:title>KimKomandologo</image:title></image:image><lastmod>2021-01-04</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-ransomware-as-a-service-and-how-does-it-work</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(13).png</image:loc><image:caption>blogposttext13</image:caption><image:title>blogposttext13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-06T123240.080.png</image:loc><image:caption>blogposttext20220706T123240080</image:caption><image:title>blogposttext20220706T123240080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(14).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews14</image:caption><image:title>CopyofBLOGSOCIALSETNews14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-alert-warns-of-tax-season-cyberscam-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC%20logo-2.png</image:loc><image:caption>CNBClogo2</image:caption><image:title>CNBClogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-03-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iran-sponsored-campaign-infiltrated-aerospace-firms-and-telecoms-using-rat-dropbox</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Oct-13-2021-03-08-02-17-AM.png</image:loc><image:caption>SCMagazinelogoOct13202103080217AM</image:caption><image:title>SCMagazinelogoOct13202103080217AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/dan-verton</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T125306.964.png</image:loc><image:caption>blogposttext20221003T125306964</image:caption><image:title>blogposttext20221003T125306964</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Biden-cybersecurity-strategy.png</image:loc><image:caption>Bidencybersecuritystrategy</image:caption><image:title>Bidencybersecuritystrategy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20MDR%20fast%20efficient%20effective.png</image:loc><image:caption>cybereasonMDRfastefficienteffective</image:caption><image:title>cybereasonMDRfastefficienteffective</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FBI-CISA-Cuba-Ransomware.png</image:loc><image:caption>FBICISACubaRansomware</image:caption><image:title>FBICISACubaRansomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(106).png</image:loc><image:caption>blogposttext106</image:caption><image:title>blogposttext106</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(112).png</image:loc><image:caption>blogposttext112</image:caption><image:title>blogposttext112</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T075722.062.png</image:loc><image:caption>blogposttext20220725T075722062</image:caption><image:title>blogposttext20220725T075722062</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10XThreat.png</image:loc><image:caption>10XThreat</image:caption><image:title>10XThreat</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-ai.png</image:loc><image:caption>cybereasonxdrai</image:caption><image:title>cybereasonxdrai</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-Jan-09-2023-06-47-00-9221-PM.png</image:loc><image:caption>blogposttextJan0920230647009221PM</image:caption><image:title>blogposttextJan0920230647009221PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/olist-cybereason-mdr.png</image:loc><image:caption>olistcybereasonmdr</image:caption><image:title>olistcybereasonmdr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10XFaster.png</image:loc><image:caption>10XFaster</image:caption><image:title>10XFaster</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/XDR_10X.png</image:loc><image:caption>XDR10X</image:caption><image:title>XDR10X</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(100).png</image:loc><image:caption>blogposttext100</image:caption><image:title>blogposttext100</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(11)-1.png</image:loc><image:caption>CybereasonBlogTemplate111</image:caption><image:title>CybereasonBlogTemplate111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRXDR.png</image:loc><image:caption>CRXDR</image:caption><image:title>CRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T114247.790-1.png</image:loc><image:caption>blogposttext20220913T1142477901</image:caption><image:title>blogposttext20220913T1142477901</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason-private-infrastructure-protection-gartner-magic-quadrant.png</image:loc><image:caption>Cybereasonprivateinfrastructureprotectiongartnermagicquadrant</image:caption><image:title>Cybereasonprivateinfrastructureprotectiongartnermagicquadrant</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-data-management.png</image:loc><image:caption>cybereasonxdrdatamanagement</image:caption><image:title>cybereasonxdrdatamanagement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zerotrust.png</image:loc><image:caption>zerotrust</image:caption><image:title>zerotrust</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Future%20SOC%20Effectiveness.png</image:loc><image:caption>FutureSOCEffectiveness</image:caption><image:title>FutureSOCEffectiveness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(68).png</image:loc><image:caption>blogposttext68</image:caption><image:title>blogposttext68</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-05T074007.547.png</image:loc><image:caption>blogposttext20220805T074007547</image:caption><image:title>blogposttext20220805T074007547</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T072538.395.png</image:loc><image:caption>blogposttext20220920T072538395</image:caption><image:title>blogposttext20220920T072538395</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(19).png</image:loc><image:caption>blogposttext19</image:caption><image:title>blogposttext19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(41).png</image:loc><image:caption>blogposttext41</image:caption><image:title>blogposttext41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/7-requirements-for-xdr.png</image:loc><image:caption>7requirementsforxdr</image:caption><image:title>7requirementsforxdr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(83).png</image:loc><image:caption>blogposttext83</image:caption><image:title>blogposttext83</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20Ransomware%20is%20Driving%20SOC%20Modernization%20Requirements.png</image:loc><image:caption>HowRansomwareisDrivingSOCModernizationRequirements</image:caption><image:title>HowRansomwareisDrivingSOCModernizationRequirements</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(4).png</image:loc><image:caption>blogposttext4</image:caption><image:title>blogposttext4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-02T092903.438.png</image:loc><image:caption>blogposttext20220602T092903438</image:caption><image:title>blogposttext20220602T092903438</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(21).png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(98).png</image:loc><image:caption>blogposttext98</image:caption><image:title>blogposttext98</image:title></image:image><lastmod>2021-11-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-equifax-data-breach-pt.-ii-the-bits-hit-the-fan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/131%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>131MALICIOUSLIFE</image:caption><image:title>131MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/45%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>45MALICIOUSLIFE</image:caption><image:title>45MALICIOUSLIFE</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/mike-smart</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/mike-smart-hs.jpg</image:loc><image:caption>mikesmarths</image:caption><image:title>mikesmarths</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-announcement-blog-featured.png</image:loc><image:caption>onpremannouncementblogfeatured</image:caption><image:title>onpremannouncementblogfeatured</image:title></image:image><lastmod>2024-02-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/startup-cybereason-raises-100-million-from-softbank</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Reuters.png</image:loc><image:caption>Reuters</image:caption><image:title>Reuters</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/how-ransomware-works</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(13).png</image:loc><image:caption>blogposttext13</image:caption><image:title>blogposttext13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_313643477-1000x391.jpg</image:loc><image:caption>shutterstock3136434771000x391</image:caption><image:title>shutterstock3136434771000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(114).png</image:loc><image:caption>blogposttext114</image:caption><image:title>blogposttext114</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-a-few-thoughts-on-the-equifax-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/ct-equifax-consumer-protection-0910-biz-20170908.jpg</image:loc><image:caption>ctequifaxconsumerprotection0910biz20170908</image:caption><image:title>ctequifaxconsumerprotection0910biz20170908</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Eliad%20Kimhy.jpg</image:loc><image:caption>EliadKimhy</image:caption><image:title>EliadKimhy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-defense-firm-cybereason-raises-200-million-from-japans-softbank</loc><image:image><image:loc>https://www.cybereason.com/hubfs/reuters%20logo.png</image:loc><image:caption>reuterslogo</image:caption><image:title>reuterslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2019-08-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/black-basta-ransomware-group-targeting-us-companies-with-qakbot-malware-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Dec-12-2022-05-04-22-6506-PM.png</image:loc><image:caption>SCMagazinelogoDec1220220504226506PM</image:caption><image:title>SCMagazinelogoDec1220220504226506PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-12-12</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-xdr-understanding-extended-detection-and-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-2.png</image:loc><image:caption>CybereasonBlogTemplate52</image:caption><image:title>CybereasonBlogTemplate52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(3).png</image:loc><image:caption>ImagefromiOS3</image:caption><image:title>ImagefromiOS3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-1.png</image:loc><image:caption>CybereasonBlogTemplate151</image:caption><image:title>CybereasonBlogTemplate151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-06-08</lastmod></url><url><loc>https://www.cybereason.com/blog/personal-info-for-more-than-half-a-billion-facebook-users-leaked-online</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FacebookHack-blog.png</image:loc><image:caption>FacebookHackblog</image:caption><image:title>FacebookHackblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T115923.524.png</image:loc><image:caption>blogposttext20220815T115923524</image:caption><image:title>blogposttext20220815T115923524</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-the-xz-backdoor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/brian-fox.png</image:loc><image:caption>brianfox</image:caption><image:title>brianfox</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/xy-backdoor-blog-1.png</image:loc><image:caption>xybackdoorblog1</image:caption><image:title>xybackdoorblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/ruslan.png</image:loc><image:caption>ruslan</image:caption><image:title>ruslan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xy-backdoor-blog-featured.png</image:loc><image:caption>xybackdoorblogfeatured</image:caption><image:title>xybackdoorblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Stellar-Discovery_v2.png</image:loc><image:caption>BLOGStellarDiscoveryv2</image:caption><image:title>BLOGStellarDiscoveryv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-05-29</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-aon-join-forces-to-identify-cyber-threats-and-mitigate-risk-before-they-become-consequential-breaches</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/darkside-ransomware-is-part-of-a-growing-underground-industry-experts-say</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20News%20logo-1.png</image:loc><image:caption>YahooNewslogo1</image:caption><image:title>YahooNewslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://www.cybereason.com/blog/research/portdoor-new-chinese-apt-backdoor-attack-targets-russian-defense-sector</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SOCIAL-2.png</image:loc><image:caption>SOCIAL2</image:caption><image:title>SOCIAL2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(5).png</image:loc><image:caption>ThreatAlerttemplate5</image:caption><image:title>ThreatAlerttemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-26</lastmod></url><url><loc>https://www.cybereason.com/press/david-kris-joins-cybereasons-advisory-board</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/three-reasons-xdr-should-drive-your-security-strategy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3XDR.png</image:loc><image:caption>3XDR</image:caption><image:title>3XDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-18T125623.731.png</image:loc><image:caption>blogposttext20220718T125623731</image:caption><image:title>blogposttext20220718T125623731</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T112612.527.png</image:loc><image:caption>blogposttext20220913T112612527</image:caption><image:title>blogposttext20220913T112612527</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereasons-asher-dotan-headlines-rsa-conference-panel</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/dealbook-briefing</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/New_York_Times_logo_variation.jpg</image:loc><image:caption>NewYorkTimeslogovariation</image:caption><image:title>NewYorkTimeslogovariation</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2019-07-01</lastmod></url><url><loc>https://www.cybereason.com/blog/is-on-premise-endpoint-protection-still-a-thing</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T131959.309.png</image:loc><image:caption>blogposttext20220926T131959309</image:caption><image:title>blogposttext20220926T131959309</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/On-Prem-Vault-Header.png</image:loc><image:caption>OnPremVaultHeader</image:caption><image:title>OnPremVaultHeader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-4.png</image:loc><image:caption>blogposttext4</image:caption><image:title>blogposttext4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-uncovers-new-malware-arsenal-abusing-facebook-and-dropbox-in-middle-east-espionage-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-12-09</lastmod></url><url><loc>https://www.cybereason.com/blog/5-steps-to-more-effective-ransomware-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/5%20steps%20to%20more%20effective%20ransomware%20response.png</image:loc><image:caption>5stepstomoreeffectiveransomwareresponse</image:caption><image:title>5stepstomoreeffectiveransomwareresponse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-yellow-bg--top-badge.png</image:loc><image:caption>crlogoyellowbgtopbadge</image:caption><image:title>crlogoyellowbgtopbadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(124).png</image:loc><image:caption>blogposttext124</image:caption><image:title>blogposttext124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T093119.758.png</image:loc><image:caption>blogposttext20220830T093119758</image:caption><image:title>blogposttext20220830T093119758</image:title></image:image><lastmod>2023-03-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-named-to-2022-cnbc-disruptor-50-list</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC%20logo-May-17-2022-02-42-36-37-PM.png</image:loc><image:caption>CNBClogoMay17202202423637PM</image:caption><image:title>CNBClogoMay17202202423637PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2022-05-17</lastmod></url><url><loc>https://www.cybereason.com/de/why-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/defenders_owlsnoname%20(1).png</image:loc><image:caption>defendersowlsnoname1</image:caption><image:title>defendersowlsnoname1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__squares-with-hex.png</image:loc><image:caption>crshapestacksquareswithhex</image:caption><image:title>crshapestacksquareswithhex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__four-lines-185px.png</image:loc><image:caption>crshapestackfourlines185px</image:caption><image:title>crshapestackfourlines185px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__why-third-hex-multi.png</image:loc><image:caption>crshapestackwhythirdhexmulti</image:caption><image:title>crshapestackwhythirdhexmulti</image:title></image:image><lastmod>2022-02-04</lastmod></url><url><loc>https://www.cybereason.com/partners/technology-partners</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/zimperium_logo.jpg</image:loc><image:caption>zimperiumlogo</image:caption><image:title>zimperiumlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/rapid1_color_logo.jpg</image:loc><image:caption>rapid1colorlogo</image:caption><image:title>rapid1colorlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/okta-logo-color-trasparent.png</image:loc><image:caption>oktalogocolortrasparent</image:caption><image:title>oktalogocolortrasparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/pingidentity_logo.jpg</image:loc><image:caption>pingidentitylogo</image:caption><image:title>pingidentitylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/beyond_identitiy.png</image:loc><image:caption>beyondidentitiy</image:caption><image:title>beyondidentitiy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/scadafence_color_logo.jpg</image:loc><image:caption>scadafencecolorlogo</image:caption><image:title>scadafencecolorlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/duoLogo-web.png</image:loc><image:caption>duoLogoweb</image:caption><image:title>duoLogoweb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/azure_bigger_logo.png</image:loc><image:caption>azurebiggerlogo</image:caption><image:title>azurebiggerlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/palo-alto-networks-color-transparent.png</image:loc><image:caption>paloaltonetworkscolortransparent</image:caption><image:title>paloaltonetworkscolortransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/mimecast-logo-transparent.png</image:loc><image:caption>mimecastlogotransparent</image:caption><image:title>mimecastlogotransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/zscaler-logo-transparent.png</image:loc><image:caption>zscalerlogotransparent</image:caption><image:title>zscalerlogotransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/darktrace-color.jpg</image:loc><image:caption>darktracecolor</image:caption><image:title>darktracecolor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-wing.png</image:loc><image:caption>crbgherobluesubtlewithwing</image:caption><image:title>crbgherobluesubtlewithwing</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/proofpoint-logo-transparent.png</image:loc><image:caption>proofpointlogotransparent</image:caption><image:title>proofpointlogotransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/google-workspace-logo.webp</image:loc><image:caption>googleworkspacelogo</image:caption><image:title>googleworkspacelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/threatq_color_logo.jpg</image:loc><image:caption>threatqcolorlogo</image:caption><image:title>threatqcolorlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/lacework_logo.png</image:loc><image:caption>laceworklogo</image:caption><image:title>laceworklogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/slack-logo-color-transparent.png</image:loc><image:caption>slacklogocolortransparent</image:caption><image:title>slacklogocolortransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/amazon-web-services-color-transparent.png</image:loc><image:caption>amazonwebservicescolortransparent</image:caption><image:title>amazonwebservicescolortransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/tt-logo.png</image:loc><image:caption>ttlogo</image:caption><image:title>ttlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE_ATTACK_logo_Lockup-black-transparent.png</image:loc><image:caption>MITREATTACKlogoLockupblacktransparent</image:caption><image:title>MITREATTACKlogoLockupblacktransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/dev/early_access_badge.png</image:loc><image:caption>earlyaccessbadge</image:caption><image:title>earlyaccessbadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/sumologic_color_logo.png</image:loc><image:caption>sumologiccolorlogo</image:caption><image:title>sumologiccolorlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/checkpoint-logo-stacked-large.png</image:loc><image:caption>checkpointlogostackedlarge</image:caption><image:title>checkpointlogostackedlarge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/opswat-logo.jpg</image:loc><image:caption>opswatlogo</image:caption><image:title>opswatlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/Sysdig_Logo.png</image:loc><image:caption>SysdigLogo</image:caption><image:title>SysdigLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/symantec-logo-transparent.png</image:loc><image:caption>symanteclogotransparent</image:caption><image:title>symanteclogotransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/azuresentinel.jpg</image:loc><image:caption>azuresentinel</image:caption><image:title>azuresentinel</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/dropbox_logo.png</image:loc><image:caption>dropboxlogo</image:caption><image:title>dropboxlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/Sevco.png</image:loc><image:caption>Sevco</image:caption><image:title>Sevco</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/oracle-logo.png</image:loc><image:caption>oraclelogo</image:caption><image:title>oraclelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/vectra_logo.jpg</image:loc><image:caption>vectralogo</image:caption><image:title>vectralogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/eclecticiq_color_logo.jpg</image:loc><image:caption>eclecticiqcolorlogo</image:caption><image:title>eclecticiqcolorlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/threatconnect_logo.jpg</image:loc><image:caption>threatconnectlogo</image:caption><image:title>threatconnectlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/clarotylogo.jpg</image:loc><image:caption>clarotylogo</image:caption><image:title>clarotylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/MS-Logo.png</image:loc><image:caption>MSLogo</image:caption><image:title>MSLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/onelogin-logo.svg</image:loc><image:caption>oneloginlogo</image:caption><image:title>oneloginlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/exterro.png</image:loc><image:caption>exterro</image:caption><image:title>exterro</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/Trellix-Logo-Black.svg</image:loc><image:caption>TrellixLogoBlack</image:caption><image:title>TrellixLogoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/polarity%20logo.png</image:loc><image:caption>polaritylogo</image:caption><image:title>polaritylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/virustotal_logo.png</image:loc><image:caption>virustotallogo</image:caption><image:title>virustotallogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/ServiceNow_logo.svg.png</image:loc><image:caption>ServiceNowlogosvg</image:caption><image:title>ServiceNowlogosvg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/google-cloud-logo-transparent-horizontal.png</image:loc><image:caption>googlecloudlogotransparenthorizontal</image:caption><image:title>googlecloudlogotransparenthorizontal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/devo_logo.jpg</image:loc><image:caption>devologo</image:caption><image:title>devologo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/Jamf-color.png</image:loc><image:caption>Jamfcolor</image:caption><image:title>Jamfcolor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/cymulate-logo.png.webp</image:loc><image:caption>cymulatelogopng</image:caption><image:title>cymulatelogopng</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/tidalcyber_logo.webp</image:loc><image:caption>tidalcyberlogo</image:caption><image:title>tidalcyberlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/attackiq_color_logo.jpg</image:loc><image:caption>attackiqcolorlogo</image:caption><image:title>attackiqcolorlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/cortex%20logo.jpg</image:loc><image:caption>cortexlogo</image:caption><image:title>cortexlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/F5-logo-transparent.png</image:loc><image:caption>F5logotransparent</image:caption><image:title>F5logotransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/cisco.jpg</image:loc><image:caption>cisco</image:caption><image:title>cisco</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/safebreach_color_logo.jpg</image:loc><image:caption>safebreachcolorlogo</image:caption><image:title>safebreachcolorlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/exabeam_color_logo.jpg</image:loc><image:caption>exabeamcolorlogo</image:caption><image:title>exabeamcolorlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/splunk_logo.jpg</image:loc><image:caption>splunklogo</image:caption><image:title>splunklogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/sw-inline-logo-color.svg</image:loc><image:caption>swinlinelogocolor</image:caption><image:title>swinlinelogocolor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Axonius%20Logo%20-%20Horizontal.png</image:loc><image:caption>AxoniusLogoHorizontal</image:caption><image:title>AxoniusLogoHorizontal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/google_chronicle_logo.png</image:loc><image:caption>googlechroniclelogo</image:caption><image:title>googlechroniclelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/fortinet-color-transparent.png</image:loc><image:caption>fortinetcolortransparent</image:caption><image:title>fortinetcolortransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/cyberark.webp</image:loc><image:caption>cyberark</image:caption><image:title>cyberark</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/IBM_logo.svg.png</image:loc><image:caption>IBMlogosvg</image:caption><image:title>IBMlogosvg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/splunk-color-transparent.png</image:loc><image:caption>splunkcolortransparent</image:caption><image:title>splunkcolortransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/balbix_logo.svg</image:loc><image:caption>balbixlogo</image:caption><image:title>balbixlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/extrahop_color.jpg</image:loc><image:caption>extrahopcolor</image:caption><image:title>extrahopcolor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/netskope_logo.png</image:loc><image:caption>netskopelogo</image:caption><image:title>netskopelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20Logos/microsoft365_logo.jpg</image:loc><image:caption>microsoft365logo</image:caption><image:title>microsoft365logo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/AdaptiveShield.svg</image:loc><image:caption>AdaptiveShield</image:caption><image:title>AdaptiveShield</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/juniper-networks-logo-transparent.png</image:loc><image:caption>junipernetworkslogotransparent</image:caption><image:title>junipernetworkslogotransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/ananda%20logo%20high%20res.png</image:loc><image:caption>anandalogohighres</image:caption><image:title>anandalogohighres</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner%20-%20Logos/D3_Security_Logo.png</image:loc><image:caption>D3SecurityLogo</image:caption><image:title>D3SecurityLogo</image:title></image:image><lastmod>2024-04-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/visual-journal-rsa-2020-conference-sam-currys-interview</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity-4.jpg</image:loc><image:caption>Bankinfosecurity4</image:caption><image:title>Bankinfosecurity4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/blog/sam-curry-on-the-real-privacy-mandate</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Privacy-day-blog-2.png</image:loc><image:caption>Privacydayblog2</image:caption><image:title>Privacydayblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-02-10</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-february-24th-live-attack-simulation-ransomware-threat-hunter-series</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(7).png</image:loc><image:caption>blogposttext7</image:caption><image:title>blogposttext7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(102).png</image:loc><image:caption>blogposttext102</image:caption><image:title>blogposttext102</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Headshot%20image%20template%20(6)-1.webp</image:loc><image:caption>CopyofHeadshotimagetemplate61</image:caption><image:title>CopyofHeadshotimagetemplate61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94).png</image:loc><image:caption>blogposttext94</image:caption><image:title>blogposttext94</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jj-hex-hs2.png</image:loc><image:caption>jjhexhs2</image:caption><image:title>jjhexhs2</image:title></image:image><lastmod>2022-02-08</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-doosan-corporation-doosan-digital-innovation-bu-partner-to-protect-apac-enterprises-from-sophisticated-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-07-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-attackers-no-days-off-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Nov-20-2021-01-23-05-79-AM.png</image:loc><image:caption>BankinfosecuritylogoNov20202101230579AM</image:caption><image:title>BankinfosecuritylogoNov20202101230579AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/password-attacks-continue-citrix-becomes-latest-victim</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/7-elements-of-modern-endpoint-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3)-2.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews32</image:caption><image:title>CopyofBLOGSOCIALSETNews32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(116).png</image:loc><image:caption>blogposttext116</image:caption><image:title>blogposttext116</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/malop.png</image:loc><image:caption>malop</image:caption><image:title>malop</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20(1)-1.png</image:loc><image:caption>blog11</image:caption><image:title>blog11</image:title></image:image><lastmod>2021-11-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/security-is-dead-long-live-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/xconomy.png</image:loc><image:caption>xconomy</image:caption><image:title>xconomy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-melissa-virus</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/27%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>27MALICIOUSLIFE1</image:caption><image:title>27MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-242-Card.png</image:loc><image:caption>MLEp242Card</image:caption><image:title>MLEp242Card</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-launches-regional-partner-program-in-the-middle-east</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Middle%20East%20logo.png</image:loc><image:caption>ChannelMiddleEastlogo</image:caption><image:title>ChannelMiddleEastlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-08-25</lastmod></url><url><loc>https://www.cybereason.com/fundamentals/what-is-extended-detection-and-response-xdr</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/101-what-is-xdr-featured-1200.png</image:loc><image:caption>101whatisxdrfeatured1200</image:caption><image:title>101whatisxdrfeatured1200</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/dark-metal-background.png</image:loc><image:caption>darkmetalbackground</image:caption><image:title>darkmetalbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-20</lastmod></url><url><loc>https://www.cybereason.com/fundamentals/what-is-malware</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/101-what-is-malware-featured.png</image:loc><image:caption>101whatismalwarefeatured</image:caption><image:title>101whatismalwarefeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/dark-metal-background.png</image:loc><image:caption>darkmetalbackground</image:caption><image:title>darkmetalbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/darkside-hackers-in-focus-after-toshiba-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/US%20News%20&amp;%20World%20Report%20logo-2.png</image:loc><image:caption>USNewsWorldReportlogo2</image:caption><image:title>USNewsWorldReportlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-05-15</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-breaking-into-secure-buildings</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/msiydghjjm3rhn8arkfd.jpeg</image:loc><image:caption>msiydghjjm3rhn8arkfd</image:caption><image:title>msiydghjjm3rhn8arkfd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/97%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>97MALICIOUSLIFE</image:caption><image:title>97MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/138%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>138MALICIOUSLIFE</image:caption><image:title>138MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-operation-ivy-bells</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/how-countries-can-lose-the-internet-ep-213.png</image:loc><image:caption>howcountriescanlosetheinternetep213</image:caption><image:title>howcountriescanlosetheinternetep213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/operation-ivy-bells-ep-208.png</image:loc><image:caption>operationivybellsep208</image:caption><image:title>operationivybellsep208</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/2014-the-year-of-cyber-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/wgbh.jpg</image:loc><image:caption>wgbh</image:caption><image:title>wgbh</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/why-cybereason-edr-beats-a-siem</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blank-avatar.png</image:loc><image:caption>blankavatar</image:caption><image:title>blankavatar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_369682940.jpg</image:loc><image:caption>shutterstock369682940</image:caption><image:title>shutterstock369682940</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/kia-motors-america-ransomware-not-behind-extended-systems-outage</loc><image:image><image:loc>https://www.cybereason.com/hubfs/kia-blog-screenshot.png</image:loc><image:caption>kiablogscreenshot</image:caption><image:title>kiablogscreenshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/kia-ransomware-blog-card.png</image:loc><image:caption>kiaransomwareblogcard</image:caption><image:title>kiaransomwareblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(7).png</image:loc><image:caption>CybereasonBlogTemplate7</image:caption><image:title>CybereasonBlogTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david-bisson-1.png</image:loc><image:caption>davidbisson1</image:caption><image:title>davidbisson1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><lastmod>2022-01-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iran-intensifies-cyber-espionage-in-middle-east-share</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Trends%20Mena%20logo.png</image:loc><image:caption>TrendsMenalogo</image:caption><image:title>TrendsMenalogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-11-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/as-ransomware-business-booms-can-defenders-keep-up</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SDX%20Central%20logo-Jun-18-2021-12-48-27-10-AM.png</image:loc><image:caption>SDXCentrallogoJun18202112482710AM</image:caption><image:title>SDXCentrallogoJun18202112482710AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-06-18</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alert-molerats-and-pierogis</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/upcoming-holidays-prompt-ransomware-warning-from-authorities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-Dec-02-2021-01-51-17-92-AM.png</image:loc><image:caption>ComputerWeeklylogoDec02202101511792AM</image:caption><image:title>ComputerWeeklylogoDec02202101511792AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/-the-state-of-nation-state-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-history-of-the-thotcon-hacking-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Nick%20Percoco.png</image:loc><image:caption>NickPercoco</image:caption><image:title>NickPercoco</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jonathan%20Tomek.png</image:loc><image:caption>JonathanTomek</image:caption><image:title>JonathanTomek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7)-1.png</image:loc><image:caption>MaliciousLifeepisode71</image:caption><image:title>MaliciousLifeepisode71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template.png</image:loc><image:caption>MaliciousLifeTemplate</image:caption><image:title>MaliciousLifeTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/research/new-cyber-espionage-campaigns-targeting-palestinians-part-2-the-discovery-of-the-new-mysterious-pierogi-backdoor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image1-22.png</image:loc><image:caption>image122</image:caption><image:title>image122</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-14.png</image:loc><image:caption>image814</image:caption><image:title>image814</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-12.png</image:loc><image:caption>image612</image:caption><image:title>image612</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-8.png</image:loc><image:caption>image168</image:caption><image:title>image168</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-18.png</image:loc><image:caption>image218</image:caption><image:title>image218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-12.png</image:loc><image:caption>image712</image:caption><image:title>image712</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-8.png</image:loc><image:caption>image188</image:caption><image:title>image188</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-11.png</image:loc><image:caption>image1011</image:caption><image:title>image1011</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-11.png</image:loc><image:caption>image1511</image:caption><image:title>image1511</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-12.png</image:loc><image:caption>image1412</image:caption><image:title>image1412</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-14.png</image:loc><image:caption>image514</image:caption><image:title>image514</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-12.png</image:loc><image:caption>image1312</image:caption><image:title>image1312</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-10.png</image:loc><image:caption>image1110</image:caption><image:title>image1110</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-11.png</image:loc><image:caption>image911</image:caption><image:title>image911</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-11.png</image:loc><image:caption>image1211</image:caption><image:title>image1211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-13.png</image:loc><image:caption>image413</image:caption><image:title>image413</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-9.png</image:loc><image:caption>image179</image:caption><image:title>image179</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-17.png</image:loc><image:caption>image317</image:caption><image:title>image317</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/palestine-attacks-blog-image.png</image:loc><image:caption>palestineattacksblogimage</image:caption><image:title>palestineattacksblogimage</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/ebook-ransomware-attackers-dont-take-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--secondary-white.png</image:loc><image:caption>crlogoinlinesecondarywhite</image:caption><image:title>crlogoinlinesecondarywhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/HolidayRansomSurvey_e-book_NewBrand10.jpg</image:loc><image:caption>HolidayRansomSurveyebookNewBrand10</image:caption><image:title>HolidayRansomSurveyebookNewBrand10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/rw-holiday-landing-page.jpg</image:loc><image:caption>rwholidaylandingpage</image:caption><image:title>rwholidaylandingpage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/HolidayRansomSurvey_e-book_NewBrand20.jpg</image:loc><image:caption>HolidayRansomSurveyebookNewBrand20</image:caption><image:title>HolidayRansomSurveyebookNewBrand20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/HolidayRansomSurvey_e-book_NewBrand5.jpg</image:loc><image:caption>HolidayRansomSurveyebookNewBrand5</image:caption><image:title>HolidayRansomSurveyebookNewBrand5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/HolidayRansomSurvey_e-book_NewBrand.jpg</image:loc><image:caption>HolidayRansomSurveyebookNewBrand</image:caption><image:title>HolidayRansomSurveyebookNewBrand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/HolidayRansomSurvey_e-book_NewBrand18.jpg</image:loc><image:caption>HolidayRansomSurveyebookNewBrand18</image:caption><image:title>HolidayRansomSurveyebookNewBrand18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware_NoRest_1200x628.jpg</image:loc><image:caption>RansomwareNoRest1200x628</image:caption><image:title>RansomwareNoRest1200x628</image:title></image:image><lastmod>2022-06-17</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-voynich-manuscript</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(10).png</image:loc><image:caption>MaliciousLifeepisode10</image:caption><image:title>MaliciousLifeepisode10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-vs.-blackcat-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Feb-28-2022-06-46-49-92-PM.png</image:loc><image:caption>image7Feb28202206464992PM</image:caption><image:title>image7Feb28202206464992PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Black%20Basta%20Threat%20Alert.png</image:loc><image:caption>BlackBastaThreatAlert</image:caption><image:title>BlackBastaThreatAlert</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Feb-28-2022-06-44-23-99-PM.png</image:loc><image:caption>image11Feb28202206442399PM</image:caption><image:title>image11Feb28202206442399PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tom%20Fakterman.png</image:loc><image:caption>TomFakterman</image:caption><image:title>TomFakterman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Feb-28-2022-06-45-32-44-PM.png</image:loc><image:caption>image12Feb28202206453244PM</image:caption><image:title>image12Feb28202206453244PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(57).png</image:loc><image:caption>image57</image:caption><image:title>image57</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Feb-28-2022-06-43-01-01-PM.png</image:loc><image:caption>image8Feb28202206430101PM</image:caption><image:title>image8Feb28202206430101PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(3).png</image:loc><image:caption>Vs3</image:caption><image:title>Vs3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Feb-28-2022-06-48-21-36-PM.png</image:loc><image:caption>image10Feb28202206482136PM</image:caption><image:title>image10Feb28202206482136PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Feb-28-2022-06-43-44-20-PM.png</image:loc><image:caption>image1Feb28202206434420PM</image:caption><image:title>image1Feb28202206434420PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Feb-28-2022-06-49-12-01-PM.png</image:loc><image:caption>image13Feb28202206491201PM</image:caption><image:title>image13Feb28202206491201PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Feb-28-2022-06-46-12-97-PM.png</image:loc><image:caption>image4Feb28202206461297PM</image:caption><image:title>image4Feb28202206461297PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Feb-28-2022-06-37-23-10-PM.png</image:loc><image:caption>image6Feb28202206372310PM</image:caption><image:title>image6Feb28202206372310PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Feb-28-2022-06-40-59-18-PM.png</image:loc><image:caption>image5Feb28202206405918PM</image:caption><image:title>image5Feb28202206405918PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Feb-28-2022-06-47-34-30-PM.png</image:loc><image:caption>image3Feb28202206473430PM</image:caption><image:title>image3Feb28202206473430PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Feb-28-2022-06-39-31-88-PM.png</image:loc><image:caption>image9Feb28202206393188PM</image:caption><image:title>image9Feb28202206393188PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Feb-28-2022-06-42-06-62-PM.png</image:loc><image:caption>image2Feb28202206420662PM</image:caption><image:title>image2Feb28202206420662PM</image:title></image:image><lastmod>2024-08-12</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-stuxnet-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sobczak_Blake_photo.jpg</image:loc><image:caption>SobczakBlakephoto</image:caption><image:title>SobczakBlakephoto</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/7%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>7MALICIOUSLIFE1</image:caption><image:title>7MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Andrew%20Ginter.png</image:loc><image:caption>AndrewGinter</image:caption><image:title>AndrewGinter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/create-a-single-file-to-protect-yourself-from-the-latest-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/zdnet-logo-large.png</image:loc><image:caption>zdnetlogolarge</image:caption><image:title>zdnetlogolarge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/deadringer-attacks-a-reminder-for-public-and-private-sectors-to-change-the-way-cyber-conflict-is-fought</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybersecurity%20ASEAN%20logo.jpg</image:loc><image:caption>CybersecurityASEANlogo</image:caption><image:title>CybersecurityASEANlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-09-22</lastmod></url><url><loc>https://www.cybereason.com/company/careers/customer-success-and-services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-ml-logo-stacked.png</image:loc><image:caption>crmllogostacked</image:caption><image:title>crmllogostacked</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-respondor-gold-8k--full-wing-transparent.png</image:loc><image:caption>crrespondorgold8kfullwingtransparent</image:caption><image:title>crrespondorgold8kfullwingtransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/dana-chen--headshot-550px.jpg</image:loc><image:caption>danachenheadshot550px</image:caption><image:title>danachenheadshot550px</image:title></image:image><lastmod>2022-09-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-how-the-internet-changed-the-nsa</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jeff%20Man.jpg</image:loc><image:caption>JeffMan</image:caption><image:title>JeffMan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(7).png</image:loc><image:caption>Maliciouslifepodcast7</image:caption><image:title>Maliciouslifepodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-144.png</image:loc><image:caption>MaliciousLife144</image:caption><image:title>MaliciousLife144</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><lastmod>2022-01-15</lastmod></url><url><loc>https://www.cybereason.com/resources/higher-education-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cs-higher-ed-cover.png</image:loc><image:caption>cshigheredcover</image:caption><image:title>cshigheredcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-08-24</lastmod></url><url><loc>https://www.cybereason.com/services/security-validation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/IR_Service_v1_thumbnail-min.png</image:loc><image:caption>IRServicev1thumbnailmin</image:caption><image:title>IRServicev1thumbnailmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-icon--black.svg</image:loc><image:caption>crlogoiconblack</image:caption><image:title>crlogoiconblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PROACTIVE_THREATHUNTING_CR_ICONS-25.png</image:loc><image:caption>PROACTIVETHREATHUNTINGCRICONS25</image:caption><image:title>PROACTIVETHREATHUNTINGCRICONS25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/MAGNIFY_CR_ICONS-45.svg</image:loc><image:caption>MAGNIFYCRICONS45</image:caption><image:title>MAGNIFYCRICONS45</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/iconsand.png</image:loc><image:caption>iconsand</image:caption><image:title>iconsand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/IR_ProfService_Brief_v1_Thumbnail.png</image:loc><image:caption>IRProfServiceBriefv1Thumbnail</image:caption><image:title>IRProfServiceBriefv1Thumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/OPTIMIZE_SECURITY_OPS_CR_ICONS-20.svg</image:loc><image:caption>OPTIMIZESECURITYOPSCRICONS20</image:caption><image:title>OPTIMIZESECURITYOPSCRICONS20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--xdr-gradient.jpg</image:loc><image:caption>crbgheroxdrgradient</image:caption><image:title>crbgheroxdrgradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/TECH_DEEPDIVE_KNOWLEDGE_CR_ICONS-27.svg</image:loc><image:caption>TECHDEEPDIVEKNOWLEDGECRICONS27</image:caption><image:title>TECHDEEPDIVEKNOWLEDGECRICONS27</image:title></image:image><lastmod>2022-10-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/rsac-video-interview-sam-curry-cso-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/infosecmag-2.jpg</image:loc><image:caption>infosecmag2</image:caption><image:title>infosecmag2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2019-04-03</lastmod></url><url><loc>https://www.cybereason.com/blog/3-straightforward-ways-to-build-a-soc</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jacob-berry-hs.jpeg</image:loc><image:caption>jacobberryhs</image:caption><image:title>jacobberryhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Building-a-SOC-Header-1.png</image:loc><image:caption>BuildingaSOCHeader1</image:caption><image:title>BuildingaSOCHeader1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/growing-pains-of-the-dept.png</image:loc><image:caption>growingpainsofthedept</image:caption><image:title>growingpainsofthedept</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(21)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews211</image:caption><image:title>CopyofBLOGSOCIALSETNews211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(62).png</image:loc><image:caption>blogposttext62</image:caption><image:title>blogposttext62</image:title></image:image><lastmod>2020-04-06</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-expands-operations-in-the-benelux-announces-partnership-with-secutec</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-12-07</lastmod></url><url><loc>https://www.cybereason.com/blog/gdpr-questions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_137098085.jpg</image:loc><image:caption>shutterstock137098085</image:caption><image:title>shutterstock137098085</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-data-management.png</image:loc><image:caption>cybereasonxdrdatamanagement</image:caption><image:title>cybereasonxdrdatamanagement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2023-02-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/biden-warns-putin-of-cyber-retaliation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Jun-17-2021-02-18-31-66-AM.png</image:loc><image:caption>BankinfosecuritylogoJun17202102183166AM</image:caption><image:title>BankinfosecuritylogoJun17202102183166AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://www.cybereason.com/2020-forrester-edr-wave</loc><image:image><image:loc>https://www.cybereason.com/hubfs/EDR-Wave-2020.png</image:loc><image:caption>EDRWave2020</image:caption><image:title>EDRWave2020</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/EDR-Wave-Rebranded-Card.png</image:loc><image:caption>EDRWaveRebrandedCard</image:caption><image:title>EDRWaveRebrandedCard</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-inc-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/incransomware-blog-1.png</image:loc><image:caption>incransomwareblog1</image:caption><image:title>incransomwareblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ivanti-threat-alert-blog-featured.png</image:loc><image:caption>ivantithreatalertblogfeatured</image:caption><image:title>ivantithreatalertblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/incransomware-blog-7.png</image:loc><image:caption>incransomwareblog7</image:caption><image:title>incransomwareblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/incransomware-blog-3.png</image:loc><image:caption>incransomwareblog3</image:caption><image:title>incransomwareblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/incransomware-blog-2.png</image:loc><image:caption>incransomwareblog2</image:caption><image:title>incransomwareblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/incransomware-blog-5.png</image:loc><image:caption>incransomwareblog5</image:caption><image:title>incransomwareblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/citrixbleed-featured-image.png</image:loc><image:caption>citrixbleedfeaturedimage</image:caption><image:title>citrixbleedfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Eli%20Salem.png</image:loc><image:caption>EliSalem</image:caption><image:title>EliSalem</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/incransomware-blog-4.png</image:loc><image:caption>incransomwareblog4</image:caption><image:title>incransomwareblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-inc-ransomware-featured-image.png</image:loc><image:caption>threatalertincransomwarefeaturedimage</image:caption><image:title>threatalertincransomwarefeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/mark-tsipershtein-hs.png</image:loc><image:caption>marktsipershteinhs</image:caption><image:title>marktsipershteinhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/marina-hs.png</image:loc><image:caption>marinahs</image:caption><image:title>marinahs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/alon-hs.jpg</image:loc><image:caption>alonhs</image:caption><image:title>alonhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2024-08-12</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-named-to-the-big-50-2016-startup-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-28</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-protecting-against-it-infrastructure-attacks-from-hafnium-and-solarwinds</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/JOHNNIE%20KONSTANTAS.png</image:loc><image:caption>JOHNNIEKONSTANTAS</image:caption><image:title>JOHNNIEKONSTANTAS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hafnium%20Webinar%20Image%20(1).png</image:loc><image:caption>HafniumWebinarImage1</image:caption><image:title>HafniumWebinarImage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel%20barak.png</image:loc><image:caption>israelbarak</image:caption><image:title>israelbarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(7).png</image:loc><image:caption>CybereasonBlogTemplate7</image:caption><image:title>CybereasonBlogTemplate7</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-the-dprk-sideshow-why-the-missile-escalation-cycle-shouldnt-be-the-main-concern</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/DPRK-header.jpg</image:loc><image:caption>DPRKheader</image:caption><image:title>DPRKheader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2017-12-15</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-recognized-by-crn-as-a-2015-emerging-vendor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(12).png</image:loc><image:caption>blogposttext12</image:caption><image:title>blogposttext12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Defendercon_LP_no%20time.jpg</image:loc><image:caption>1200x627DefenderconLPnotime</image:caption><image:title>1200x627DefenderconLPnotime</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-10-1024x391.png</image:loc><image:caption>Untitleddesign101024x391</image:caption><image:title>Untitleddesign101024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-corporations-can-do-to-guard-against-apts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cyberscoop%20logo-1.png</image:loc><image:caption>cyberscooplogo1</image:caption><image:title>cyberscooplogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2019-04-26</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-predicting-line-between-cyberspace-geopolitical-action</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/predicting-the-line-banner.jpg</image:loc><image:caption>predictingthelinebanner</image:caption><image:title>predictingthelinebanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-malware-intentionally-bricks-iot-devices</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Bleeping-Computer1.png</image:loc><image:caption>BleepingComputer1</image:caption><image:title>BleepingComputer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereasons-ngav-engine-is-now-integrated-into-virustotal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ta505-group-hides-malware-in-legitimate-certificates</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity-2.jpg</image:loc><image:caption>Bankinfosecurity2</image:caption><image:title>Bankinfosecurity2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-xdr-google-chronicle-ink-cloud-native-security-partnership</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-Oct-13-2021-02-43-02-92-AM.png</image:loc><image:caption>MSSPAlertlogoOct13202102430292AM</image:caption><image:title>MSSPAlertlogoOct13202102430292AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sigh...-hundreds-of-thousands-of...-sigh-web-cctv-cams-still-at-risk-of...-sigh-hijacking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/The-Register-800x267.jpg</image:loc><image:caption>TheRegister800x267</image:caption><image:title>TheRegister800x267</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/https/www.securityweek.com/holiday-cybersecurity-staffing-levels-difficult-balancing-act-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-Nov-23-2022-02-22-51-4580-PM.jpg</image:loc><image:caption>SecurityWeeklogoNov2320220222514580PM</image:caption><image:title>SecurityWeeklogoNov2320220222514580PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2022-11-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/radisson-member-rewards-program-breached</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-4.png</image:loc><image:caption>SCMagazine4</image:caption><image:title>SCMagazine4</image:title></image:image><lastmod>2018-11-09</lastmod></url><url><loc>https://www.cybereason.com/platform/vulnerability-management</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Vulnerability%20Management/Cybereason-unified-risk-view.png</image:loc><image:caption>Cybereasonunifiedriskview</image:caption><image:title>Cybereasonunifiedriskview</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Vulnerability%20Management/Cybereason-vulnerability-reporting.png</image:loc><image:caption>Cybereasonvulnerabilityreporting</image:caption><image:title>Cybereasonvulnerabilityreporting</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase__mobile-group-preventid.png</image:loc><image:caption>crowlshowcasemobilegrouppreventid</image:caption><image:title>crowlshowcasemobilegrouppreventid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-icon--black.svg</image:loc><image:caption>crlogoiconblack</image:caption><image:title>crlogoiconblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Vulnerability%20Management/Cybereason-vulnerability-CVEs.png</image:loc><image:caption>CybereasonvulnerabilityCVEs</image:caption><image:title>CybereasonvulnerabilityCVEs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-gen-feat-img-web-1.png</image:loc><image:caption>cybereasongenfeatimgweb1</image:caption><image:title>cybereasongenfeatimgweb1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Vulnerability%20Management/Cybereason-CVE-identification.png</image:loc><image:caption>CybereasonCVEidentification</image:caption><image:title>CybereasonCVEidentification</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--platform-02-gradient.jpg</image:loc><image:caption>crbgheroplatform02gradient</image:caption><image:title>crbgheroplatform02gradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Vulnerability%20Management/Cybereason-automated-vulnerability-assessment.png</image:loc><image:caption>Cybereasonautomatedvulnerabilityassessment</image:caption><image:title>Cybereasonautomatedvulnerabilityassessment</image:title></image:image><lastmod>2025-11-11</lastmod></url><url><loc>https://www.cybereason.com/press/integrated-vulnerability-management-launch</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-black-hat-live-fighting-the-latest-attack-vectors-live-demo</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_369959120-1000x391.jpg</image:loc><image:caption>shutterstock3699591201000x391</image:caption><image:title>shutterstock3699591201000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>140MALICIOUSLIFE</image:caption><image:title>140MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(113).png</image:loc><image:caption>blogposttext113</image:caption><image:title>blogposttext113</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-security-company-cybereason-launches-with-4.6m</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/vator_tv.jpg</image:loc><image:caption>vatortv</image:caption><image:title>vatortv</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-inside-clearview-ai-facial-recognition-0</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-244-Card.png</image:loc><image:caption>MLEp244Card</image:caption><image:title>MLEp244Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yossi-CB2021.png</image:loc><image:caption>YossiCB2021</image:caption><image:title>YossiCB2021</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/99%20-%20MALICIOUS%20LIFE%20(1).png</image:loc><image:caption>99MALICIOUSLIFE1</image:caption><image:title>99MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ted-claypool.png</image:loc><image:caption>tedclaypool</image:caption><image:title>tedclaypool</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(14).png</image:loc><image:caption>MaliciousLifeepisode14</image:caption><image:title>MaliciousLifeepisode14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/video-osx-pirrit-shows-the-potentially-malicious-side-of-mac-adware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/behind-closed-doors-rise-of-remote-access-featured.png</image:loc><image:caption>behindcloseddoorsriseofremoteaccessfeatured</image:caption><image:title>behindcloseddoorsriseofremoteaccessfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/snake-python-infostealer-blog-featured.png</image:loc><image:caption>snakepythoninfostealerblogfeatured</image:caption><image:title>snakepythoninfostealerblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/shutterstock_349563746-1000x391.jpg</image:loc><image:caption>shutterstock3495637461000x391</image:caption><image:title>shutterstock3495637461000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-detects-and-prevents-3cxdesktopapp-supply-chain-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Trojanized%203xcdesktopapp.exe%20process%20prevented.png</image:loc><image:caption>Trojanized3xcdesktopappexeprocessprevented</image:caption><image:title>Trojanized3xcdesktopappexeprocessprevented</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MalOpTM%20created%20after%20the%20execution%20of%20the%20trojanized%203xcdesktopapp.exe%20application.png</image:loc><image:caption>MalOpTMcreatedaftertheexecutionofthetrojanized3xcdesktopappexeapplication</image:caption><image:title>MalOpTMcreatedaftertheexecutionofthetrojanized3xcdesktopappexeapplication</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/variant-payload-prevention.png</image:loc><image:caption>variantpayloadprevention</image:caption><image:title>variantpayloadprevention</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(18).png</image:loc><image:caption>BLOGImagesTemplatev218</image:caption><image:title>BLOGImagesTemplatev218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Process%20prevention%20of%20the%20trojanized%20application.png</image:loc><image:caption>Processpreventionofthetrojanizedapplication</image:caption><image:title>Processpreventionofthetrojanizedapplication</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2023-03-31</lastmod></url><url><loc>https://www.cybereason.com/fundamentals/what-is-mitre-attack</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/101-what-is-mitre-featured.png</image:loc><image:caption>101whatismitrefeatured</image:caption><image:title>101whatismitrefeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/dark-metal-background.png</image:loc><image:caption>darkmetalbackground</image:caption><image:title>darkmetalbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-09-20</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-communications-before-during-and-after-a-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Melanie%20Ensign.png</image:loc><image:caption>MelanieEnsign</image:caption><image:title>MelanieEnsign</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(6).png</image:loc><image:caption>CISOStoriestemplate6</image:caption><image:title>CISOStoriestemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories%20(1).png</image:loc><image:caption>CISOStories1</image:caption><image:title>CISOStories1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/blog/what-are-the-most-common-attack-vectors-for-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-1.png</image:loc><image:caption>CybereasonBlogTemplate41</image:caption><image:title>CybereasonBlogTemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(19)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews191</image:caption><image:title>CopyofBLOGSOCIALSETNews191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(2)-3.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews23</image:caption><image:title>CopyofBLOGSOCIALSETNews23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-one-of-bostons-best-companies-to-work-for</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-01-15</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-aon-partner-to-end-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ai-potential-cybersecurity-featured.png</image:loc><image:caption>aipotentialcybersecurityfeatured</image:caption><image:title>aipotentialcybersecurityfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(15)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews151</image:caption><image:title>CopyofBLOGSOCIALSETNews151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-2.png</image:loc><image:caption>CybereasonBlogTemplate152</image:caption><image:title>CybereasonBlogTemplate152</image:title></image:image><lastmod>2021-10-22</lastmod></url><url><loc>https://www.cybereason.com/resources/night-of-the-devil-ransomware-or-wiper-a-look-into-targeted-attacks-in-japan-using-mbr-oni</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Wall-LARGEV2-1.png</image:loc><image:caption>WallLARGEV21</image:caption><image:title>WallLARGEV21</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/resources/securing-your-enterprise-endpoints-in-todays-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/stars.png</image:loc><image:caption>stars</image:caption><image:title>stars</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-08-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/yahoo-3-billion-accounts-breached-in-2013.-yes-3-billion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/new-york-times-logo.jpg</image:loc><image:caption>newyorktimeslogo</image:caption><image:title>newyorktimeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/you-should-be-afraid-of-sim-swaps</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5).png</image:loc><image:caption>MaliciousLifeepisode5</image:caption><image:title>MaliciousLifeepisode5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5)-1.png</image:loc><image:caption>MaliciousLifeepisode51</image:caption><image:title>MaliciousLifeepisode51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-bags-4.6m-from-charles-river-ventures-for-series-a-round</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/vcpost.jpg</image:loc><image:caption>vcpost</image:caption><image:title>vcpost</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/resources/webinar-solving-the-incident-response-data-problem</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Solving-the-Incident-Response-Data-Problem-April%2027th.png</image:loc><image:caption>SolvingtheIncidentResponseDataProblemApril27th</image:caption><image:title>SolvingtheIncidentResponseDataProblemApril27th</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2022-04-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/companies-caught-off-guard-by-holiday-and-weekend-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Beta%20News%20logo-Nov-23-2022-02-21-12-1342-PM.png</image:loc><image:caption>BetaNewslogoNov2320220221121342PM</image:caption><image:title>BetaNewslogoNov2320220221121342PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-11-23</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-malicious-life-now-ranked-in-the-top-10-on-itunes</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-01-09</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-achieves-100-percent-coverage-for-windows-and-linux-threat-prevention-in-2020-mitre-engenuity-attck-evaluations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/these-are-just-the-disruptive-criminal-hack-attacks-we-know-about</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNN%20logo-Jun-10-2021-04-39-49-95-PM.png</image:loc><image:caption>CNNlogoJun10202104394995PM</image:caption><image:title>CNNlogoJun10202104394995PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/russian-outsourcing-provides-plausible-deniability-for-state-sponsored-hacking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/fundamentals/what-is-ngav</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/101-what-is-ngav-featured.png</image:loc><image:caption>101whatisngavfeatured</image:caption><image:title>101whatisngavfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/dark-metal-background.png</image:loc><image:caption>darkmetalbackground</image:caption><image:title>darkmetalbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-20</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-hires-cybersecurity-industry-veteran-greg-day-as-global-field-chief-information-security-officer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/why-its-worth-divorcing-information-security-from-it</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-welcomed-congressman-joe-kennedy-iii-to-its-global-headquarters</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/u.s.-report-on-democratic-hacking-was-wake-up-call-for-improved-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Untitled-design-13.png</image:loc><image:caption>Untitleddesign13</image:caption><image:title>Untitleddesign13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/cerber-ransomware-vaccine</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-51.jpg</image:loc><image:caption>Untitleddesign51</image:caption><image:title>Untitleddesign51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Uri%20Sternfeld.jpeg</image:loc><image:caption>UriSternfeld</image:caption><image:title>UriSternfeld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><lastmod>2018-12-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/gandcrab-ransomware-detected-targeting-manufacturing-firm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Securityweek-logo-2.jpg</image:loc><image:caption>Securityweeklogo2</image:caption><image:title>Securityweeklogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/blog/five-ransomware-myths-that-leave-businesses-vulnerable</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template-2.png</image:loc><image:caption>CybereasonBlogTemplate2</image:caption><image:title>CybereasonBlogTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(27).png</image:loc><image:caption>blogposttext27</image:caption><image:title>blogposttext27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware.png</image:loc><image:caption>ransomware</image:caption><image:title>ransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-01-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/years-long-campaign-targets-hackers-through-trojanized-hacking-tools</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zdnet-6.png</image:loc><image:caption>zdnet6</image:caption><image:title>zdnet6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/coronavirus-trump-threats-geopolitical-campaigns-how-they-affect-your-business-what-you-should-do</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-15.png</image:loc><image:caption>SCMagazine15</image:caption><image:title>SCMagazine15</image:title></image:image><lastmod>2020-02-13</lastmod></url><url><loc>https://www.cybereason.com/blog/just-because-youre-home-doesnt-mean-youre-safe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WFH-Safe-Blog-Header.png</image:loc><image:caption>WFHSafeBlogHeader</image:caption><image:title>WFHSafeBlogHeader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-campaign-leverages-bitbucket-to-deliver-arsenal-of-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Securityweek-logo-3.jpg</image:loc><image:caption>Securityweeklogo3</image:caption><image:title>Securityweeklogo3</image:title></image:image><lastmod>2020-02-11</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-secures-funding-for-edr-growth</loc><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(12).png</image:loc><image:caption>BLOGImagesTemplatev212</image:caption><image:title>BLOGImagesTemplatev212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2025-03-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-breach-ios-15-windows-10-during-massive-cyber-security-onslaught</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes%20logo-Nov-10-2021-01-44-54-66-AM.png</image:loc><image:caption>ForbeslogoNov10202101445466AM</image:caption><image:title>ForbeslogoNov10202101445466AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-11-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-black-basta-ransomware-campaign-is-actively-targeting-us-companies-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Silicon%20Angle%20logo-3.png</image:loc><image:caption>SiliconAnglelogo3</image:caption><image:title>SiliconAnglelogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2022-12-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/microsoft-outlook-forms-could-allow-hackers-to-run-visual-basic-code</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iranian-apt-targets-aerospace-and-telecom-firms-with-stealthy-shellclient-trojan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-2.png</image:loc><image:caption>CSOMagazinelogo2</image:caption><image:title>CSOMagazinelogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-m.tech-partner-to-strengthen-organizations-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/attacker-tries-to-poison-florida-citys-water-supply</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(77).png</image:loc><image:caption>blogposttext77</image:caption><image:title>blogposttext77</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/florida-water-facility-blog-final.png</image:loc><image:caption>floridawaterfacilityblogfinal</image:caption><image:title>floridawaterfacilityblogfinal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(18).png</image:loc><image:caption>CybereasonBlogTemplate18</image:caption><image:title>CybereasonBlogTemplate18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2021-11-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/local-firms-fend-off-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/BostonGlobe.jpg</image:loc><image:caption>BostonGlobe</image:caption><image:title>BostonGlobe</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/xdr-foundations-eliminating-fragmented-cybersecurity-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Future%20SOC%20Effectiveness.png</image:loc><image:caption>FutureSOCEffectiveness</image:caption><image:title>FutureSOCEffectiveness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-data-management.png</image:loc><image:caption>cybereasonxdrdatamanagement</image:caption><image:title>cybereasonxdrdatamanagement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-05-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/preparing-for-supply-chain-attacks-during-peacetime</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-Aug-17-2022-05-01-29-73-PM.png</image:loc><image:caption>DatabreachtodaylogoAug17202205012973PM</image:caption><image:title>DatabreachtodaylogoAug17202205012973PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-08-17</lastmod></url><url><loc>https://www.cybereason.com/blog/update-your-apple-devices-to-guard-against-pegasus-spyware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-1.png</image:loc><image:caption>CISOStoriestemplate71</image:caption><image:title>CISOStoriestemplate71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(125).png</image:loc><image:caption>blogposttext125</image:caption><image:title>blogposttext125</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(28).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews28</image:caption><image:title>CopyofBLOGSOCIALSETNews28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-09-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/biden-promises-retaliation-unless-putin-stops-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-4.png</image:loc><image:caption>Databreachtodaylogo4</image:caption><image:title>Databreachtodaylogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-06-18</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-new-honeypot-project-traps-hackers-attempting-to-infiltrate-industrial-control-systems-of-major-electricity-provider</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-08-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-and-retail</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/RetailTouchPoints.png</image:loc><image:caption>RetailTouchPoints</image:caption><image:title>RetailTouchPoints</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-chinas-unrestricted-cyberwarfare-part-3</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>CopyofBLOGSOCIALSETMALICIOUSLIFE</image:caption><image:title>CopyofBLOGSOCIALSETMALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ad-fraud-pt1-ep-217.png</image:loc><image:caption>adfraudpt1ep217</image:caption><image:title>adfraudpt1ep217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bill%20Hagestad%20.png</image:loc><image:caption>BillHagestad</image:caption><image:title>BillHagestad</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-advisory-board</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-05</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cybereason-ciso-interview-series-the-case-for-an-independent-security-department</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-18.jpg</image:loc><image:caption>Untitleddesign18</image:caption><image:title>Untitleddesign18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/reason-you-dont-have-data-privacy-ep-214.png</image:loc><image:caption>reasonyoudonthavedataprivacyep214</image:caption><image:title>reasonyoudonthavedataprivacyep214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/press/trustwave-and-cybereason-forge-alliance-to-bolster-managed-endpoint-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-02-21</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-designing-a-shared-vision-with-it-and-the-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-2.png</image:loc><image:caption>CISOStoriestemplate42</image:caption><image:title>CISOStoriestemplate42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/scottking-0.jpeg</image:loc><image:caption>scottking0</image:caption><image:title>scottking0</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast.png</image:loc><image:caption>Maliciouslifepodcast</image:caption><image:title>Maliciouslifepodcast</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/blog/how-an-integrated-approach-is-key-for-security-operations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-18T125623.731.png</image:loc><image:caption>blogposttext20220718T125623731</image:caption><image:title>blogposttext20220718T125623731</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(72).png</image:loc><image:caption>blogposttext72</image:caption><image:title>blogposttext72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-13T051646.778.png</image:loc><image:caption>blogposttext20220713T051646778</image:caption><image:title>blogposttext20220713T051646778</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><lastmod>2022-07-13</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-super-spies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(7).png</image:loc><image:caption>Maliciouslifepodcast7</image:caption><image:title>Maliciouslifepodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7).png</image:loc><image:caption>MaliciousLifeepisode7</image:caption><image:title>MaliciousLifeepisode7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/18%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>18MALICIOUSLIFE1</image:caption><image:title>18MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-msi-masquerading-as-software-installer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2023.png</image:loc><image:caption>MSIBlogImage23</image:caption><image:title>MSIBlogImage23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2022.png</image:loc><image:caption>MSIBlogImage22</image:caption><image:title>MSIBlogImage22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/msi-blog-images-fig-49.png</image:loc><image:caption>msiblogimagesfig49</image:caption><image:title>msiblogimagesfig49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2033.png</image:loc><image:caption>MSIBlogImage33</image:caption><image:title>MSIBlogImage33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2048.png</image:loc><image:caption>MSIBlogImage48</image:caption><image:title>MSIBlogImage48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2031.png</image:loc><image:caption>MSIBlogImage31</image:caption><image:title>MSIBlogImage31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2028.png</image:loc><image:caption>MSIBlogImage28</image:caption><image:title>MSIBlogImage28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2030.png</image:loc><image:caption>MSIBlogImage30</image:caption><image:title>MSIBlogImage30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%204.png</image:loc><image:caption>MSIBlogImage4</image:caption><image:title>MSIBlogImage4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2040.png</image:loc><image:caption>MSIBlogImage40</image:caption><image:title>MSIBlogImage40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2047.png</image:loc><image:caption>MSIBlogImage47</image:caption><image:title>MSIBlogImage47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Robin%20Plumer.jpg</image:loc><image:caption>RobinPlumer</image:caption><image:title>RobinPlumer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%202%20Custom%20Action.png</image:loc><image:caption>MSIBlogImage2CustomAction</image:caption><image:title>MSIBlogImage2CustomAction</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2020.png</image:loc><image:caption>MSIBlogImage20</image:caption><image:title>MSIBlogImage20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2053.png</image:loc><image:caption>MSIBlogImage53</image:caption><image:title>MSIBlogImage53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2032.png</image:loc><image:caption>MSIBlogImage32</image:caption><image:title>MSIBlogImage32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/msi-blog-image-blue-crop.png</image:loc><image:caption>msiblogimagebluecrop</image:caption><image:title>msiblogimagebluecrop</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2029.png</image:loc><image:caption>MSIBlogImage29</image:caption><image:title>MSIBlogImage29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%201%20DB.png</image:loc><image:caption>MSIBlogImage1DB</image:caption><image:title>MSIBlogImage1DB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2017.png</image:loc><image:caption>MSIBlogImage17</image:caption><image:title>MSIBlogImage17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2025.png</image:loc><image:caption>MSIBlogImage25</image:caption><image:title>MSIBlogImage25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2044.png</image:loc><image:caption>MSIBlogImage44</image:caption><image:title>MSIBlogImage44</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2018.png</image:loc><image:caption>MSIBlogImage18</image:caption><image:title>MSIBlogImage18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%207.png</image:loc><image:caption>MSIBlogImage7</image:caption><image:title>MSIBlogImage7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2034.png</image:loc><image:caption>MSIBlogImage34</image:caption><image:title>MSIBlogImage34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(84).png</image:loc><image:caption>blogposttext84</image:caption><image:title>blogposttext84</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2039.png</image:loc><image:caption>MSIBlogImage39</image:caption><image:title>MSIBlogImage39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2010.png</image:loc><image:caption>MSIBlogImage10</image:caption><image:title>MSIBlogImage10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2041.png</image:loc><image:caption>MSIBlogImage41</image:caption><image:title>MSIBlogImage41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Ralph%20Villanueva.png</image:loc><image:caption>RalphVillanueva</image:caption><image:title>RalphVillanueva</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2050.png</image:loc><image:caption>MSIBlogImage50</image:caption><image:title>MSIBlogImage50</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%209.png</image:loc><image:caption>MSIBlogImage9</image:caption><image:title>MSIBlogImage9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2014.png</image:loc><image:caption>MSIBlogImage14</image:caption><image:title>MSIBlogImage14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%208.png</image:loc><image:caption>MSIBlogImage8</image:caption><image:title>MSIBlogImage8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Kotaro%20Ogino.jpg</image:loc><image:caption>KotaroOgino</image:caption><image:title>KotaroOgino</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%203.jpg</image:loc><image:caption>MSIBlogImage3</image:caption><image:title>MSIBlogImage3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI-Blog-Image%204-cropped.png</image:loc><image:caption>MSIBlogImage4cropped</image:caption><image:title>MSIBlogImage4cropped</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2011.jpg</image:loc><image:caption>MSIBlogImage11</image:caption><image:title>MSIBlogImage11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2051.png</image:loc><image:caption>MSIBlogImage51</image:caption><image:title>MSIBlogImage51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2042.png</image:loc><image:caption>MSIBlogImage42</image:caption><image:title>MSIBlogImage42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2013.png</image:loc><image:caption>MSIBlogImage13</image:caption><image:title>MSIBlogImage13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2019.jpg</image:loc><image:caption>MSIBlogImage19</image:caption><image:title>MSIBlogImage19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2038.png</image:loc><image:caption>MSIBlogImage38</image:caption><image:title>MSIBlogImage38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2024.png</image:loc><image:caption>MSIBlogImage24</image:caption><image:title>MSIBlogImage24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSI%20Masquerading%20as%20a%20Malicious%20Software%20Installer%20blog.png</image:loc><image:caption>MSIMasqueradingasaMaliciousSoftwareInstallerblog</image:caption><image:title>MSIMasqueradingasaMaliciousSoftwareInstallerblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2036.png</image:loc><image:caption>MSIBlogImage36</image:caption><image:title>MSIBlogImage36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2027.png</image:loc><image:caption>MSIBlogImage27</image:caption><image:title>MSIBlogImage27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2016.png</image:loc><image:caption>MSIBlogImage16</image:caption><image:title>MSIBlogImage16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2045.png</image:loc><image:caption>MSIBlogImage45</image:caption><image:title>MSIBlogImage45</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2046.png</image:loc><image:caption>MSIBlogImage46</image:caption><image:title>MSIBlogImage46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2012.png</image:loc><image:caption>MSIBlogImage12</image:caption><image:title>MSIBlogImage12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI-Blog-Image%204-cropped-b.png</image:loc><image:caption>MSIBlogImage4croppedb</image:caption><image:title>MSIBlogImage4croppedb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2052.png</image:loc><image:caption>MSIBlogImage52</image:caption><image:title>MSIBlogImage52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2026.png</image:loc><image:caption>MSIBlogImage26</image:caption><image:title>MSIBlogImage26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/msi-blog-image-37b.png</image:loc><image:caption>msiblogimage37b</image:caption><image:title>msiblogimage37b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2015.png</image:loc><image:caption>MSIBlogImage15</image:caption><image:title>MSIBlogImage15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MSI%20Blog%20Image%2043.png</image:loc><image:caption>MSIBlogImage43</image:caption><image:title>MSIBlogImage43</image:title></image:image><lastmod>2022-12-07</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-google-cloud-join-forces-to-drive-xdr-innovation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(38)-1.png</image:loc><image:caption>CybereasonBlogTemplate381</image:caption><image:title>CybereasonBlogTemplate381</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jeff%20Lebowitz.png</image:loc><image:caption>JeffLebowitz</image:caption><image:title>JeffLebowitz</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(92).png</image:loc><image:caption>blogposttext92</image:caption><image:title>blogposttext92</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Google_LinkedIn.jpg</image:loc><image:caption>GoogleLinkedIn</image:caption><image:title>GoogleLinkedIn</image:title></image:image><lastmod>2022-03-11</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-earns-perfect-scores-in-sc-magazine-review</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-mitre-23-lp-featured-1.png</image:loc><image:caption>crmitre23lpfeatured1</image:caption><image:title>crmitre23lpfeatured1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202025-01-17%20at%203.25.26%20PM.png</image:loc><image:caption>Screenshot20250117at32526PM</image:caption><image:title>Screenshot20250117at32526PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/defend-forward-in-the-private-sector</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-15T085736.357.png</image:loc><image:caption>blogposttext20220915T085736357</image:caption><image:title>blogposttext20220915T085736357</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(111).png</image:loc><image:caption>blogposttext111</image:caption><image:title>blogposttext111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T071527.904.png</image:loc><image:caption>blogposttext20221006T071527904</image:caption><image:title>blogposttext20221006T071527904</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Meridith%20Levinson.png</image:loc><image:caption>MeridithLevinson</image:caption><image:title>MeridithLevinson</image:title></image:image><lastmod>2022-05-26</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-human-side-channels</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/63%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>63MALICIOUSLIFE</image:caption><image:title>63MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-232-Card.png</image:loc><image:caption>MLEp232Card</image:caption><image:title>MLEp232Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/matt_wixey-PNG-pwcimage-200-252.jpeg</image:loc><image:caption>mattwixeyPNGpwcimage200252</image:caption><image:title>mattwixeyPNGpwcimage200252</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-mdr-security-embraces-north-american-mssp-partners</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-2.png</image:loc><image:caption>MSSPAlertlogo2</image:caption><image:title>MSSPAlertlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-04-06</lastmod></url><url><loc>https://www.cybereason.com/blog/accenture-responds-following-lockbit-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-1.png</image:loc><image:caption>Capture1</image:caption><image:title>Capture1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture2.png</image:loc><image:caption>Capture2</image:caption><image:title>Capture2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(42).png</image:loc><image:caption>CybereasonBlogTemplate42</image:caption><image:title>CybereasonBlogTemplate42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-announces-record-emea-revenue-customer-growth-with-200-percent-spikes</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-06-06</lastmod></url><url><loc>https://www.cybereason.com/blog/detecting-of-unknown-threats-the-power-of-incrimination</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Incrimination-Blog-banner-1.gif</image:loc><image:caption>IncriminationBlogbanner1</image:caption><image:title>IncriminationBlogbanner1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/insider-knowledge-a-defenders-greatest-advantage-against-attackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(105)-1.png</image:loc><image:caption>blogposttext1051</image:caption><image:title>blogposttext1051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20Hadar%20Harari.png</image:loc><image:caption>EmployeeSpotlightHadarHarari</image:caption><image:title>EmployeeSpotlightHadarHarari</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/William%20Lefevers.jpeg</image:loc><image:caption>WilliamLefevers</image:caption><image:title>WilliamLefevers</image:title></image:image><lastmod>2018-12-18</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-warns-global-organizations-against-attacks-from-the-royal-ransomware-group</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-12-14</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-new-cyber-defenders-council-report-on-the-role-of-regulation-in-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-securelink-partner-to-deliver-new-security-services-to-nordics-benelux-uk-and-dach-region-enterprises</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-10-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/bazar-malware-may-be-new-tool-in-trickbot-arsenal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo.png</image:loc><image:caption>ComputerWeeklylogo</image:caption><image:title>ComputerWeeklylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-08-06</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-achieves-highest-rating-in-nss-labs-2020-advanced-endpoint-protection-comparative-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/kyle-flaherty</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kyle-headshot-circle.png</image:loc><image:caption>kyleheadshotcircle</image:caption><image:title>kyleheadshotcircle</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/mlsa</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-11-09</lastmod></url><url><loc>https://www.cybereason.com/blog/video-google-cloud-and-cybereason-shift-the-xdr-paradigm-to-detect-and-anticipate</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2023%20Cybersecurity%20Predictions.png</image:loc><image:caption>2023CybersecurityPredictions</image:caption><image:title>2023CybersecurityPredictions</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(9)-1.png</image:loc><image:caption>CybereasonBlogTemplate91</image:caption><image:title>CybereasonBlogTemplate91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-03-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-state-department-hit-by-cyber-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Aug-27-2021-12-21-08-84-AM.png</image:loc><image:caption>InfosecurityMagazinelogoAug27202112210884AM</image:caption><image:title>InfosecurityMagazinelogoAug27202112210884AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-08-27</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomfree-behavioral-based-ransomware-blocking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/jigsaw-1.png</image:loc><image:caption>jigsaw1</image:caption><image:title>jigsaw1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-06T070615.090.png</image:loc><image:caption>blogposttext20220906T070615090</image:caption><image:title>blogposttext20220906T070615090</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Uri%20Sternfeld.jpeg</image:loc><image:caption>UriSternfeld</image:caption><image:title>UriSternfeld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Royal%20Ransomware-1.png</image:loc><image:caption>RoyalRansomware1</image:caption><image:title>RoyalRansomware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-02-06</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-attacks-by-the-numbers-and-how-to-defend-against-them</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template-2.png</image:loc><image:caption>CybereasonBlogTemplate2</image:caption><image:title>CybereasonBlogTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-20T064817.923.png</image:loc><image:caption>blogposttext20220720T064817923</image:caption><image:title>blogposttext20220720T064817923</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10biggest.png</image:loc><image:caption>10biggest</image:caption><image:title>10biggest</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-07-22</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-server-room-to-war-room-enterprise-incident-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories.png</image:loc><image:caption>CISOStories</image:caption><image:title>CISOStories</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dawnmarieh-0.jpeg</image:loc><image:caption>dawnmarieh0</image:caption><image:title>dawnmarieh0</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO_51.png</image:loc><image:caption>CISO51</image:caption><image:title>CISO51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-02-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/insurance-regulatory-ripples-likely-after-colonial-pipeline-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bloomberg%20Law%20logo.png</image:loc><image:caption>BloombergLawlogo</image:caption><image:title>BloombergLawlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-05-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/say-small-footprint-again.-i-dare-you</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/computer_world.jpg</image:loc><image:caption>computerworld</image:caption><image:title>computerworld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-hackers-took-just-three-days-to-find-this-fake-industrial-network-and-fill-it-with-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet-2.jpg</image:loc><image:caption>ZDNet2</image:caption><image:title>ZDNet2</image:title></image:image><lastmod>2020-06-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hbos-got-attack-shows-hackers-love-preying-on-hollywood</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CNET.png</image:loc><image:caption>CNET</image:caption><image:title>CNET</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/research/one-two-punch-emotet-trickbot-and-ryuk-steal-then-ransom-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/workflow.png</image:loc><image:caption>workflow</image:caption><image:title>workflow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(3).png</image:loc><image:caption>Vs3</image:caption><image:title>Vs3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><lastmod>2023-03-21</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-hosts-first-secure-massachusetts-briefing</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/threat-alert-emotet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-attack-goal.png</image:loc><image:caption>criconattackgoal</image:caption><image:title>criconattackgoal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-hero-bg.jpg</image:loc><image:caption>threatalertherobg</image:caption><image:title>threatalertherobg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/YELLOW_THREAT_ALERT_CR_ICONS-53.svg</image:loc><image:caption>YELLOWTHREATALERTCRICONS53</image:caption><image:title>YELLOWTHREATALERTCRICONS53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-threat-type.png</image:loc><image:caption>criconthreattype</image:caption><image:title>criconthreattype</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/icons-all/Asset%203.png</image:loc><image:caption>Asset3</image:caption><image:title>Asset3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-block-executable.png</image:loc><image:caption>criconblockexecutable</image:caption><image:title>criconblockexecutable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-impacted-geo.png</image:loc><image:caption>criconimpactedgeo</image:caption><image:title>criconimpactedgeo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner-Page-Icons-03.png</image:loc><image:caption>PartnerPageIcons03</image:caption><image:title>PartnerPageIcons03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-remediate-disable.png</image:loc><image:caption>criconremediatedisable</image:caption><image:title>criconremediatedisable</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-multi-stage-ransomware-live</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(21).png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel%20barak.jpg</image:loc><image:caption>israelbarak</image:caption><image:title>israelbarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>140MALICIOUSLIFE</image:caption><image:title>140MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/85%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>85MALICIOUSLIFE</image:caption><image:title>85MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/gdpr-six-months-on-is-it-working-sam-curry-cybereason-cso-chimes-in-dont-bayonet-the-wounded</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict-Logo-3.jpg</image:loc><image:caption>VerdictLogo3</image:caption><image:title>VerdictLogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2018-12-03</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-to-host-ciso-roundtable-on-ransomware-attacks-and-the-true-cost-to-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-07-27</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-recognized-as-highest-rated-cloud-computing-company-to-work-for-by-battery-ventures</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-12-23</lastmod></url><url><loc>https://www.cybereason.com/resources</loc><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE%202024%20CYBEREASON.png</image:loc><image:caption>MITRE2024CYBEREASON</image:caption><image:title>MITRE2024CYBEREASON</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/consulting-collateral-lg.jpg</image:loc><image:caption>consultingcollaterallg</image:caption><image:title>consultingcollaterallg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/controls-cover-web.jpg</image:loc><image:caption>controlscoverweb</image:caption><image:title>controlscoverweb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-pagination__next.png</image:loc><image:caption>crpaginationnext</image:caption><image:title>crpaginationnext</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/ICC-Video-Ransomware-MDR.png</image:loc><image:caption>ICCVideoRansomwareMDR</image:caption><image:title>ICCVideoRansomwareMDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vulnerability-management-cybereason.jpg</image:loc><image:caption>vulnerabilitymanagementcybereason</image:caption><image:title>vulnerabilitymanagementcybereason</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-pagination__prev.png</image:loc><image:caption>crpaginationprev</image:caption><image:title>crpaginationprev</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/How-LLMs-Evolving-Cybersecurity-July-2024.png</image:loc><image:caption>HowLLMsEvolvingCybersecurityJuly2024</image:caption><image:title>HowLLMsEvolvingCybersecurityJuly2024</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Decoding-Power-AI-On-Demand.png</image:loc><image:caption>DecodingPowerAIOnDemand</image:caption><image:title>DecodingPowerAIOnDemand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/CR-mobile-theat-defense-thumb-cover.jpg</image:loc><image:caption>CRmobiletheatdefensethumbcover</image:caption><image:title>CRmobiletheatdefensethumbcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Cybersecurity-Redefined-Banner-09.10.24.png</image:loc><image:caption>CybersecurityRedefinedBanner091024</image:caption><image:title>CybersecurityRedefinedBanner091024</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-08-03</lastmod></url><url><loc>https://www.cybereason.com/resources/attackers-turn-to-masquerading-icons-to-boost-phishing-attacks-success</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/chris-davis-9963%20(2)-1.jpg</image:loc><image:caption>chrisdavis996321</image:caption><image:title>chrisdavis996321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-04-19</lastmod></url><url><loc>https://www.cybereason.com/blog/study-uk-enterprises-struggle-with-cyber-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_245619199-1000x391.jpg</image:loc><image:caption>shutterstock2456191991000x391</image:caption><image:title>shutterstock2456191991000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(91).png</image:loc><image:caption>blogposttext91</image:caption><image:title>blogposttext91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(74).png</image:loc><image:caption>blogposttext74</image:caption><image:title>blogposttext74</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/defining-xdr-from-an-mssp-perspective</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews</image:caption><image:title>CopyofBLOGSOCIALSETNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-13T051646.778.png</image:loc><image:caption>blogposttext20220713T051646778</image:caption><image:title>blogposttext20220713T051646778</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Tallent%20Profile%2016.jpg</image:loc><image:caption>TallentProfile16</image:caption><image:title>TallentProfile16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-super-60-company-by-jmp-securities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-14</lastmod></url><url><loc>https://www.cybereason.com/resources/osx.pirrit-mac-adware-part-iii-the-davinci-code</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pirrit-blog-banner.jpg</image:loc><image:caption>pirritblogbanner</image:caption><image:title>pirritblogbanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-04-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/advanced-persistent-threats-and-the-board-moving-past-fud</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hbo-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Information-Security-Buzz-Logo-800x743.jpg</image:loc><image:caption>InformationSecurityBuzzLogo800x743</image:caption><image:title>InformationSecurityBuzzLogo800x743</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/five-of-the-most-advanced-ransomops-gangs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-27T072602.816.png</image:loc><image:caption>blogposttext20220727T072602816</image:caption><image:title>blogposttext20220727T072602816</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-05T080649.580.png</image:loc><image:caption>blogposttext20220705T080649580</image:caption><image:title>blogposttext20220705T080649580</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/four-in-five-ransomware-victims-suffer-repeat-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITPro%20logo-1.png</image:loc><image:caption>ITPrologo1</image:caption><image:title>ITPrologo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/undefeated-in-mitre-attck-evaluations-undefeated-against-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202025-01-17%20at%203.25.26%20PM.png</image:loc><image:caption>Screenshot20250117at32526PM</image:caption><image:title>Screenshot20250117at32526PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202022-04-01%20at%2008-53-07%20April%201%2022%20-%20MITRE%20Enterprise%20Eval%2022.png</image:loc><image:caption>Screenshot20220401at085307April122MITREEnterpriseEval22</image:caption><image:title>Screenshot20220401at085307April122MITREEnterpriseEval22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202022-04-01%20at%2008-45-34%20April%201%2022%20-%20MITRE%20Enterprise%20Eval%2022.png</image:loc><image:caption>Screenshot20220401at084534April122MITREEnterpriseEval22</image:caption><image:title>Screenshot20220401at084534April122MITREEnterpriseEval22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-mitre-23-lp-featured-1.png</image:loc><image:caption>crmitre23lpfeatured1</image:caption><image:title>crmitre23lpfeatured1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202022-04-01%20at%2008-48-34%20April%201%2022%20-%20MITRE%20Enterprise%20Eval%2022.png</image:loc><image:caption>Screenshot20220401at084834April122MITREEnterpriseEval22</image:caption><image:title>Screenshot20220401at084834April122MITREEnterpriseEval22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202022-04-01%20at%2008-51-22%20April%201%2022%20-%20MITRE%20Enterprise%20Eval%2022.png</image:loc><image:caption>Screenshot20220401at085122April122MITREEnterpriseEval22</image:caption><image:title>Screenshot20220401at085122April122MITREEnterpriseEval22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202022-04-01%20at%2008-50-14%20April%201%2022%20-%20MITRE%20Enterprise%20Eval%2022.png</image:loc><image:caption>Screenshot20220401at085014April122MITREEnterpriseEval22</image:caption><image:title>Screenshot20220401at085014April122MITREEnterpriseEval22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/softbank-to-invest-another-200m-in-security-firm-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bloomberg-logo.jpg</image:loc><image:caption>bloomberglogo</image:caption><image:title>bloomberglogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2019-08-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/north-korean-hackers-are-working-with-eastern-european-cybercriminals-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC_logo.svg-3.png</image:loc><image:caption>CNBClogosvg3</image:caption><image:title>CNBClogosvg3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-unveils-free-ransomware-protection-tool</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/say-small-footprint-again.-i-dare-you-i-double-dare-you</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/forrester.jpg</image:loc><image:caption>forrester</image:caption><image:title>forrester</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-to-retain-your-cyber-staff</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Sep-01-2022-08-38-27-27-PM.png</image:loc><image:caption>SCMagazinelogoSep01202208382727PM</image:caption><image:title>SCMagazinelogoSep01202208382727PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-09-01</lastmod></url><url><loc>https://www.cybereason.com/platform/endpoint-detection-response-edr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/Cybereason%20Malop%20Machines%20Screen.png</image:loc><image:caption>CybereasonMalopMachinesScreen</image:caption><image:title>CybereasonMalopMachinesScreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/it-cs-case-study-cover.png</image:loc><image:caption>itcscasestudycover</image:caption><image:title>itcscasestudycover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-edr-datasheet--thumb.jpg</image:loc><image:caption>credrdatasheetthumb</image:caption><image:title>credrdatasheetthumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malop%20details-1.png</image:loc><image:caption>Malopdetails1</image:caption><image:title>Malopdetails1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/CR_Disovery_Board.png</image:loc><image:caption>CRDisoveryBoard</image:caption><image:title>CRDisoveryBoard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/Cybereason%20Platform%20System%20Overview%20Screen.png</image:loc><image:caption>CybereasonPlatformSystemOverviewScreen</image:caption><image:title>CybereasonPlatformSystemOverviewScreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/cr-ai-ml-screenshot-02-min.png</image:loc><image:caption>craimlscreenshot02min</image:caption><image:title>craimlscreenshot02min</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/Cybereason%20Malop%20Process%20Screen.png</image:loc><image:caption>CybereasonMalopProcessScreen</image:caption><image:title>CybereasonMalopProcessScreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/CR_ICONS_MONO-09.svg</image:loc><image:caption>CRICONSMONO09</image:caption><image:title>CRICONSMONO09</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/cr-ai-ml-screenshot-03-min.png</image:loc><image:caption>craimlscreenshot03min</image:caption><image:title>craimlscreenshot03min</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR2_CR_ICONS_MONO-11.png</image:loc><image:caption>EDR2CRICONSMONO11</image:caption><image:title>EDR2CRICONSMONO11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/CR_ICONS_MONO-25.svg</image:loc><image:caption>CRICONSMONO25</image:caption><image:title>CRICONSMONO25</image:title></image:image><lastmod>2024-01-11</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-emerges-as-top-vendor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-28</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cisos-need-to-speak-the-language-of-risk</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/jamesbruce-1.jpg</image:loc><image:caption>jamesbruce1</image:caption><image:title>jamesbruce1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(8).png</image:loc><image:caption>CISOStoriespodcast8</image:caption><image:title>CISOStoriespodcast8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_658892227.jpg</image:loc><image:caption>shutterstock658892227</image:caption><image:title>shutterstock658892227</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/bridging-the-gap-balancing-security-compliance-and-innovation-in-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Home%20Revamp%20Images/full-banner-bg-mobile.webp</image:loc><image:caption>fullbannerbgmobile</image:caption><image:title>fullbannerbgmobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-11T064615.861.png</image:loc><image:caption>blogposttext20221011T064615861</image:caption><image:title>blogposttext20221011T064615861</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/bridging-th-gap-blog-featured.png</image:loc><image:caption>bridgingthgapblogfeatured</image:caption><image:title>bridgingthgapblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jens-hs.jpg</image:loc><image:caption>jenshs</image:caption><image:title>jenshs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(121).png</image:loc><image:caption>blogposttext121</image:caption><image:title>blogposttext121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-xdr-delivering-future-ready-attack-protection-beyond-the-endpoint</loc><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/xdr-blog-card-hero.png</image:loc><image:caption>xdrblogcardhero</image:caption><image:title>xdrblogcardhero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/blog/analyst-report-how-to-prepare-for-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(105)-1.png</image:loc><image:caption>blogposttext1051</image:caption><image:title>blogposttext1051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(107).png</image:loc><image:caption>blogposttext107</image:caption><image:title>blogposttext107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(43).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews43</image:caption><image:title>CopyofBLOGSOCIALSETNews43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><lastmod>2021-09-27</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-expands-its-global-rd-and-establishes-a-development-hub-in-japan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-07-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/googles-project-zero-changes-disclosure-policy-infosec-community-debates-the-need</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-14.png</image:loc><image:caption>SCMagazine14</image:caption><image:title>SCMagazine14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-01-14</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-op.-gunman-the-worlds-first-keylogger</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/operation-ivy-bells-ep-208.png</image:loc><image:caption>operationivybellsep208</image:caption><image:title>operationivybellsep208</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-224-Card.png</image:loc><image:caption>MLEp224Card</image:caption><image:title>MLEp224Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/93%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>93MALICIOUSLIFE</image:caption><image:title>93MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/M-oOsRWp.jpg</image:loc><image:caption>MoOsRWp</image:caption><image:title>MoOsRWp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/now-this-botnet-is-hunting-for-unpatched-microsoft-exchange-servers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo-Apr-23-2021-01-43-46-61-AM.png</image:loc><image:caption>ZDNetlogoApr23202101434661AM</image:caption><image:title>ZDNetlogoApr23202101434661AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-named-2018-sc-awards-finalist</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-raises-100m-from-softbank-to-dominate-cybersecurity-market</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Boston-Business-Journal.jpg</image:loc><image:caption>BostonBusinessJournal</image:caption><image:title>BostonBusinessJournal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-launches-global-defenders-league-partner-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-wanna-cry-not-petya-boeing-atlanta</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Deep%20Sensor-Architecture%20(1).jpg</image:loc><image:caption>DeepSensorArchitecture1</image:caption><image:title>DeepSensorArchitecture1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(8)-1.png</image:loc><image:caption>CybereasonBlogTemplate81</image:caption><image:title>CybereasonBlogTemplate81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(20)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews201</image:caption><image:title>CopyofBLOGSOCIALSETNews201</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-aims-to-block-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/eWeek.png</image:loc><image:caption>eWeek</image:caption><image:title>eWeek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-mimicks-apt-campaigns-for-first-time</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-named-to-cnbc-2022-disruptor-50-list-for-second-consecutive-year</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(107).png</image:loc><image:caption>blogposttext107</image:caption><image:title>blogposttext107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CybereasonBlogHeroTemplate</image:caption><image:title>CybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee.png</image:loc><image:caption>Employee</image:caption><image:title>Employee</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/all-organisations-should-adopt-anti-sms-spoofing-measures-say-cyber-security-experts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Straights%20Times%20logo-1.jpg</image:loc><image:caption>TheStraightsTimeslogo1</image:caption><image:title>TheStraightsTimeslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-nigerian-prince</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-242-Card.png</image:loc><image:caption>MLEp242Card</image:caption><image:title>MLEp242Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Deborah-Schaffer.jpg</image:loc><image:caption>DeborahSchaffer</image:caption><image:title>DeborahSchaffer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-05-28</lastmod></url><url><loc>https://www.cybereason.com/blog/the-silent-epidemic-uncovering-the-dangers-of-alert-fatigue-and-how-to-overcome-it</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/alert-fatigue-the-silent-epidemic-featured-blog.png</image:loc><image:caption>alertfatiguethesilentepidemicfeaturedblog</image:caption><image:title>alertfatiguethesilentepidemicfeaturedblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(32)-1.png</image:loc><image:caption>CybereasonBlogTemplate321</image:caption><image:title>CybereasonBlogTemplate321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/wannacry-does-not-fit-north-koreas-style-interests-experts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/these-researchers-worry-more-about-cybercriminals-hacking-the-grid-than-nation-state-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Wash%20Post%20Logo-2.png</image:loc><image:caption>WashPostLogo2</image:caption><image:title>WashPostLogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-09-24</lastmod></url><url><loc>https://www.cybereason.com/blog/attack-on-montenegro-further-evidence-of-nation-state-and-cybercriminal-crossover</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(3).png</image:loc><image:caption>CybereasonBlogtemplate3</image:caption><image:title>CybereasonBlogtemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-09-01</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-introduces-method-for-detecting-unknown-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-06-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/why-hacker-hunter-cybereason-is-seeing-surging-growth</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/next-generation-antivirus-101-layers-of-prevention</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113218.959.png</image:loc><image:caption>blogposttext20220920T113218959</image:caption><image:title>blogposttext20220920T113218959</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV-101-A.png</image:loc><image:caption>NGAV101A</image:caption><image:title>NGAV101A</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware-Lock.jpg</image:loc><image:caption>RansomwareLock</image:caption><image:title>RansomwareLock</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV-101-C.png</image:loc><image:caption>NGAV101C</image:caption><image:title>NGAV101C</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/security-bod-threatened-with-legal-action-for-uncovering-macos-adware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The-Inquirer.jpg</image:loc><image:caption>TheInquirer</image:caption><image:title>TheInquirer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-a-reason-to-watch-cyber-attacks-in-real-time</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/siliconvalleywatcher.jpg</image:loc><image:caption>siliconvalleywatcher</image:caption><image:title>siliconvalleywatcher</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/these-100-companies-are-leading-the-way-in-a.i</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/fortune-ai-100.png</image:loc><image:caption>fortuneai100</image:caption><image:title>fortuneai100</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomfree-by-cybereason-is-a-free-ransomware-alert-tool-for-windows-pcs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Yahoo-Tech1.png</image:loc><image:caption>YahooTech1</image:caption><image:title>YahooTech1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/de/platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__optional-100px.png</image:loc><image:caption>crchartoptional100px</image:caption><image:title>crchartoptional100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-left-1.svg</image:loc><image:caption>futurereadyleft1</image:caption><image:title>futurereadyleft1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-cloud.svg</image:loc><image:caption>smalliconcloud</image:caption><image:title>smalliconcloud</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-air-gapped.svg</image:loc><image:caption>smalliconairgapped</image:caption><image:title>smalliconairgapped</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-on-prem.svg</image:loc><image:caption>smallicononprem</image:caption><image:title>smallicononprem</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-apple.svg</image:loc><image:caption>smalliconapple</image:caption><image:title>smalliconapple</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-linux.svg</image:loc><image:caption>smalliconlinux</image:caption><image:title>smalliconlinux</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-android.svg</image:loc><image:caption>smalliconandroid</image:caption><image:title>smalliconandroid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-100px.png</image:loc><image:caption>crchartcheckmark100px</image:caption><image:title>crchartcheckmark100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/platform-datasheet-cover-de.png</image:loc><image:caption>platformdatasheetcoverde</image:caption><image:title>platformdatasheetcoverde</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-left-2.svg</image:loc><image:caption>futurereadyleft2</image:caption><image:title>futurereadyleft2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/footer-line.svg</image:loc><image:caption>footerline</image:caption><image:title>footerline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-feature__flex--shape-collage.png</image:loc><image:caption>crbgfeatureflexshapecollage</image:caption><image:title>crbgfeatureflexshapecollage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-hybrid.svg</image:loc><image:caption>smalliconhybrid</image:caption><image:title>smalliconhybrid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-yellowBG-100px.png</image:loc><image:caption>crchartcheckmarkyellowBG100px</image:caption><image:title>crchartcheckmarkyellowBG100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-right-2.svg</image:loc><image:caption>futurereadyright2</image:caption><image:title>futurereadyright2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/CR_Disovery_Board.png</image:loc><image:caption>CRDisoveryBoard</image:caption><image:title>CRDisoveryBoard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILITY_HUNTING_CR_ICONS-13.svg</image:loc><image:caption>VISIBILITYHUNTINGCRICONS13</image:caption><image:title>VISIBILITYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-windows.svg</image:loc><image:caption>smalliconwindows</image:caption><image:title>smalliconwindows</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-right-1.svg</image:loc><image:caption>futurereadyright1</image:caption><image:title>futurereadyright1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/REALTIME_PROTECTION_MULTILAYERED_CR_ICONS-04.svg</image:loc><image:caption>REALTIMEPROTECTIONMULTILAYEREDCRICONS04</image:caption><image:title>REALTIMEPROTECTIONMULTILAYEREDCRICONS04</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PLATFORM2_CR_ICONS-02.svg</image:loc><image:caption>PLATFORM2CRICONS02</image:caption><image:title>PLATFORM2CRICONS02</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/malop-graphic-de-1.png</image:loc><image:caption>malopgraphicde1</image:caption><image:title>malopgraphicde1</image:title></image:image><lastmod>2024-02-13</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-announces-deep-2017-event</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereasons-sam-curry-examines-how-to-fix-fed-it-for-ransomware-and-supply-chain-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MeriTalk%20TV%20logo.png</image:loc><image:caption>MeriTalkTVlogo</image:caption><image:title>MeriTalkTVlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/zero-days-why-these-security-flaws-are-so-dangerous-and-expensive-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/christian-science-monitor-logo-800x709.jpg</image:loc><image:caption>christiansciencemonitorlogo800x709</image:caption><image:title>christiansciencemonitorlogo800x709</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/wmi-lateral-movement-win32</loc><image:image><image:loc>https://www.cybereason.com/hubfs/different%20WMI.png</image:loc><image:caption>differentWMI</image:caption><image:title>differentWMI</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/notevil2.png</image:loc><image:caption>notevil2</image:caption><image:title>notevil2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/notevil.png</image:loc><image:caption>notevil</image:caption><image:title>notevil</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WIN32PROVIDERCLASS.png</image:loc><image:caption>WIN32PROVIDERCLASS</image:caption><image:title>WIN32PROVIDERCLASS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/INSTALL%20MSI%20PACKAGE.png</image:loc><image:caption>INSTALLMSIPACKAGE</image:caption><image:title>INSTALLMSIPACKAGE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UNINSTALL%20STRING.png</image:loc><image:caption>UNINSTALLSTRING</image:caption><image:title>UNINSTALLSTRING</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(88).png</image:loc><image:caption>blogposttext88</image:caption><image:title>blogposttext88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wmi.png</image:loc><image:caption>wmi</image:caption><image:title>wmi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/phil.jpg</image:loc><image:caption>phil</image:caption><image:title>phil</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/chris-davis-9963%20(2)-1.jpg</image:loc><image:caption>chrisdavis996321</image:caption><image:title>chrisdavis996321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/philipwin.png</image:loc><image:caption>philipwin</image:caption><image:title>philipwin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/excerptfrom.png</image:loc><image:caption>excerptfrom</image:caption><image:title>excerptfrom</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wiresharkcapture.png</image:loc><image:caption>wiresharkcapture</image:caption><image:title>wiresharkcapture</image:title></image:image><lastmod>2023-06-07</lastmod></url><url><loc>https://www.cybereason.com/resources/five-stages-webinar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hacker_Silhouette_1920x1080.jpg</image:loc><image:caption>HackerSilhouette1920x1080</image:caption><image:title>HackerSilhouette1920x1080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-04-16</lastmod></url><url><loc>https://www.cybereason.com/blog/five-things-you-need-to-know-about-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-14T093955.662.png</image:loc><image:caption>blogposttext20220614T093955662</image:caption><image:title>blogposttext20220614T093955662</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T134258.568.png</image:loc><image:caption>blogposttext20220627T134258568</image:caption><image:title>blogposttext20220627T134258568</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/5Things-blog-1.png</image:loc><image:caption>5Thingsblog1</image:caption><image:title>5Thingsblog1</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cybereason-security-researchers-answer-your-questions-on-starting-an-information-security-career</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(35).png</image:loc><image:caption>blogposttext35</image:caption><image:title>blogposttext35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_660298330.jpg</image:loc><image:caption>shutterstock660298330</image:caption><image:title>shutterstock660298330</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3)-2.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews32</image:caption><image:title>CopyofBLOGSOCIALSETNews32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/mlsa-general-terms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alert-pyvil-rat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/resources/esg-research-report-2021-endpoint-security-trends</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/esg-endpoint-security-trends-report-fi.jpg</image:loc><image:caption>esgendpointsecuritytrendsreportfi</image:caption><image:title>esgendpointsecuritytrendsreportfi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-01-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/friend-finder-data-breach-exposes-400m-swingers-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CIO-Today2.png</image:loc><image:caption>CIOToday2</image:caption><image:title>CIOToday2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/major-apple-security-bug-lets-anyone-gain-access-to-your-macos-high-sierra-machine-heres-how-to-fix-it</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/buzzfeed-.jpg</image:loc><image:caption>buzzfeed</image:caption><image:title>buzzfeed</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/20-cybersecurity-startups-to-watch-in-2016</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/dark_reading1.jpg</image:loc><image:caption>darkreading1</image:caption><image:title>darkreading1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-ciso-interview-your-business-is-unique-and-your-infosec-measures-should-be-too</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_92115119.jpg</image:loc><image:caption>shutterstock92115119</image:caption><image:title>shutterstock92115119</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Untitled-design-39-1.png</image:loc><image:caption>Untitleddesign391</image:caption><image:title>Untitleddesign391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-02-10</lastmod></url><url><loc>https://www.cybereason.com/resources/webinar-assessing-the-cyberattack-risk-in-the-russia-ukraine-conflict</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Russia%20Ukraine%20Webinar.png</image:loc><image:caption>RussiaUkraineWebinar</image:caption><image:title>RussiaUkraineWebinar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-05-12</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-xdr-or-edr-how-should-your-soc-choose</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel%20barak.jpg</image:loc><image:caption>israelbarak</image:caption><image:title>israelbarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(10).png</image:loc><image:caption>CybereasonBlogTemplate10</image:caption><image:title>CybereasonBlogTemplate10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/allie%20mellen.jpg</image:loc><image:caption>alliemellen</image:caption><image:title>alliemellen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(30).png</image:loc><image:caption>blogposttext30</image:caption><image:title>blogposttext30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><lastmod>2021-05-21</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-resilience-retainer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/resilience-retainer-649.jpg</image:loc><image:caption>resilienceretainer649</image:caption><image:title>resilienceretainer649</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2025-09-08</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-uses-new-capital-to-significantly-expand-its-award-winning-endpoint-protection-platform-offering</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/NGAV_Header.jpg</image:loc><image:caption>NGAVHeader</image:caption><image:title>NGAVHeader</image:title></image:image><lastmod>2019-11-12</lastmod></url><url><loc>https://www.cybereason.com/blog/leveraging-artificial-intelligence-to-prevent-ransomops-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(3).png</image:loc><image:caption>ImagefromiOS3</image:caption><image:title>ImagefromiOS3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-2.png</image:loc><image:caption>CybereasonBlogTemplate52</image:caption><image:title>CybereasonBlogTemplate52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(43).png</image:loc><image:caption>blogposttext43</image:caption><image:title>blogposttext43</image:title></image:image><lastmod>2022-04-07</lastmod></url><url><loc>https://www.cybereason.com/blog/indicators-of-behavior-and-the-diminishing-value-of-iocs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(46).png</image:loc><image:caption>blogposttext46</image:caption><image:title>blogposttext46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-12T072834.369-1.png</image:loc><image:caption>blogposttext20221012T0728343691</image:caption><image:title>blogposttext20221012T0728343691</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(82).png</image:loc><image:caption>blogposttext82</image:caption><image:title>blogposttext82</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-10-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/heres-why-raccoon-infostealer-is-popular-with-criminals</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Data%20Breach%20Today%20logo-1.png</image:loc><image:caption>DataBreachTodaylogo1</image:caption><image:title>DataBreachTodaylogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2019-11-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-reels-from-solarwinds-microsoft-exchange-attack-one-two-punch</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SDX%20Central%20logo-4.png</image:loc><image:caption>SDXCentrallogo4</image:caption><image:title>SDXCentrallogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-03-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/eventbot-banking-trojan-targets-users-of-over-200-different-financial-apps</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TEISS%20logo.png</image:loc><image:caption>TEISSlogo</image:caption><image:title>TEISSlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-launches-new-complete-next-generation-endpoint-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_521279863.jpg</image:loc><image:caption>shutterstock521279863</image:caption><image:title>shutterstock521279863</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-3.png</image:loc><image:caption>CybereasonBlogTemplate53</image:caption><image:title>CybereasonBlogTemplate53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8481.png</image:loc><image:caption>IMG8481</image:caption><image:title>IMG8481</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-04-04</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-section-230-the-law-that-makes-social-media-great-and-terrible</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-244-Card.png</image:loc><image:caption>MLEp244Card</image:caption><image:title>MLEp244Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ted-claypool.png</image:loc><image:caption>tedclaypool</image:caption><image:title>tedclaypool</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(21).png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><lastmod>2024-06-26</lastmod></url><url><loc>https://www.cybereason.com/blog/how-threat-hunting-is-different-from-an-intrusion-detection-system</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design.png</image:loc><image:caption>Untitleddesign</image:caption><image:title>Untitleddesign</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2019-01-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/android-missed-delivery-message-scam-targets-royal-mail-app-users</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSN%20logo-2.png</image:loc><image:caption>MSNlogo2</image:caption><image:title>MSNlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-07-15</lastmod></url><url><loc>https://www.cybereason.com/press/google-cloud-and-cybereason-join-forces-to-drive-xdr-innovation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-wreaks-worse-havoc-on-holidays-weekends</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Frontier%20Enterprise%20Magazine%20logo.jpg</image:loc><image:caption>FrontierEnterpriseMagazinelogo</image:caption><image:title>FrontierEnterpriseMagazinelogo</image:title></image:image><lastmod>2023-01-11</lastmod></url><url><loc>https://www.cybereason.com/blog/cisos-career-management-change-and-data-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(4).png</image:loc><image:caption>CISOStoriespodcast4</image:caption><image:title>CISOStoriespodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_731706145.jpg</image:loc><image:caption>shutterstock731706145</image:caption><image:title>shutterstock731706145</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-06-29</lastmod></url><url><loc>https://www.cybereason.com/blog/biden-putin-summit-and-why-threat-actors-just-wont-give-it-a-rest</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(22).png</image:loc><image:caption>CybereasonBlogTemplate22</image:caption><image:title>CybereasonBlogTemplate22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://www.cybereason.com/terms/sub-processor-dpa</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/mustang-panda-compromises-indonesian-intelligence-agency</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Sep-22-2021-01-16-34-64-AM.png</image:loc><image:caption>InfosecurityMagazinelogoSep22202101163464AM</image:caption><image:title>InfosecurityMagazinelogoSep22202101163464AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-09-22</lastmod></url><url><loc>https://www.cybereason.com/blog/workforce-challenges-are-here-to-stay-time-to-think-about-mdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T072538.395.png</image:loc><image:caption>blogposttext20220920T072538395</image:caption><image:title>blogposttext20220920T072538395</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(98).png</image:loc><image:caption>blogposttext98</image:caption><image:title>blogposttext98</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-yellow-bg--top-badge.png</image:loc><image:caption>crlogoyellowbgtopbadge</image:caption><image:title>crlogoyellowbgtopbadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zerotrust.png</image:loc><image:caption>zerotrust</image:caption><image:title>zerotrust</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><lastmod>2022-09-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-new-mobile-mdr-services-for-ios-android-devices</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mssp-alert-logo-1.png</image:loc><image:caption>msspalertlogo1</image:caption><image:title>msspalertlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-04-28</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-discovers-mobile-device-malware-targeting-the-users-of-popular-financial-banking-apps-in-emea-and-u.s</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-04-30</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-inside-the-darkside-colonial-pipeline-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/113%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>113MALICIOUSLIFE</image:caption><image:title>113MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(4).png</image:loc><image:caption>Maliciouslifepodcast4</image:caption><image:title>Maliciouslifepodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/assaf.jpg</image:loc><image:caption>assaf</image:caption><image:title>assaf</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/2021-forrester-mdr-wave</loc><image:image><image:loc>https://www.cybereason.com/hubfs/mdr_wave_concept_1_1200x628.jpg</image:loc><image:caption>mdrwaveconcept11200x628</image:caption><image:title>mdrwaveconcept11200x628</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-05-18</lastmod></url><url><loc>https://www.cybereason.com/resources/securelink-pensiondanmark</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pensiondanmark-card.png</image:loc><image:caption>pensiondanmarkcard</image:caption><image:title>pensiondanmarkcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-02-18</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-deadringer-exposing-chinese-apts-targeting-major-telcos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/assaf.jpg</image:loc><image:caption>assaf</image:caption><image:title>assaf</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/123%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>123MALICIOUSLIFE</image:caption><image:title>123MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(8).png</image:loc><image:caption>MaliciousLifeepisode8</image:caption><image:title>MaliciousLifeepisode8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(4).png</image:loc><image:caption>Maliciouslifepodcast4</image:caption><image:title>Maliciouslifepodcast4</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/morning-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Politico.png</image:loc><image:caption>Politico</image:caption><image:title>Politico</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-06-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/raspberry-robin-windows-worm-abuses-qnap-devices</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-Jul-20-2022-02-34-52-48-AM.jpg</image:loc><image:caption>SecurityWeeklogoJul20202202345248AM</image:caption><image:title>SecurityWeeklogoJul20202202345248AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/blog/what-we-learned-during-the-government-shutdown-of-2019</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybersecurity-government-shutdown.jpg</image:loc><image:caption>cybersecuritygovernmentshutdown</image:caption><image:title>cybersecuritygovernmentshutdown</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/putin-whoever-rules-ai-rules-the-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CIO-Today2.png</image:loc><image:caption>CIOToday2</image:caption><image:title>CIOToday2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/irans-forceful-revenge-against-the-us-is-likely-to-include-cyberwarfare</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Business%20Insider%20logo-1.png</image:loc><image:caption>BusinessInsiderlogo1</image:caption><image:title>BusinessInsiderlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-01-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/enterprises-unprepared-for-ransomware-attacks-over-weekends-and-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Beta%20News%20logo-4.png</image:loc><image:caption>BetaNewslogo4</image:caption><image:title>BetaNewslogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-11-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-use-stealthy-shellclient-malware-on-aerospace-telco-firms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bleeping%20Computer%20logo-3.png</image:loc><image:caption>BleepingComputerlogo3</image:caption><image:title>BleepingComputerlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-analysis-report-datoploader-exploits-proxyshell-to-deliver-qbot-and-cobalt-strike</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Jan-10-2022-04-33-36-80-PM.png</image:loc><image:caption>image11Jan10202204333680PM</image:caption><image:title>image11Jan10202204333680PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Jan-10-2022-04-38-08-65-PM.png</image:loc><image:caption>image10Jan10202204380865PM</image:caption><image:title>image10Jan10202204380865PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Jan-10-2022-04-29-18-94-PM.png</image:loc><image:caption>image4Jan10202204291894PM</image:caption><image:title>image4Jan10202204291894PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Jan-10-2022-04-25-55-28-PM.png</image:loc><image:caption>image8Jan10202204255528PM</image:caption><image:title>image8Jan10202204255528PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Jan-10-2022-04-26-38-58-PM.png</image:loc><image:caption>image15Jan10202204263858PM</image:caption><image:title>image15Jan10202204263858PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Jan-10-2022-04-34-43-51-PM.png</image:loc><image:caption>image1Jan10202204344351PM</image:caption><image:title>image1Jan10202204344351PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Jan-10-2022-04-39-31-09-PM.png</image:loc><image:caption>image13Jan10202204393109PM</image:caption><image:title>image13Jan10202204393109PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Jan-10-2022-04-32-01-22-PM.png</image:loc><image:caption>image6Jan10202204320122PM</image:caption><image:title>image6Jan10202204320122PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Jan-10-2022-04-29-48-63-PM.png</image:loc><image:caption>image7Jan10202204294863PM</image:caption><image:title>image7Jan10202204294863PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Jan-10-2022-04-30-38-01-PM.png</image:loc><image:caption>image3Jan10202204303801PM</image:caption><image:title>image3Jan10202204303801PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Jan-10-2022-04-28-34-65-PM.png</image:loc><image:caption>image14Jan10202204283465PM</image:caption><image:title>image14Jan10202204283465PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Jan-10-2022-04-27-35-27-PM.png</image:loc><image:caption>image12Jan10202204273527PM</image:caption><image:title>image12Jan10202204273527PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Jan-10-2022-04-31-31-35-PM.png</image:loc><image:caption>image5Jan10202204313135PM</image:caption><image:title>image5Jan10202204313135PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T115923.524.png</image:loc><image:caption>blogposttext20220815T115923524</image:caption><image:title>blogposttext20220815T115923524</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(6).png</image:loc><image:caption>ThreatAlerttemplate6</image:caption><image:title>ThreatAlerttemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Jan-10-2022-04-32-32-41-PM.png</image:loc><image:caption>image2Jan10202204323241PM</image:caption><image:title>image2Jan10202204323241PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Jan-10-2022-04-37-05-36-PM.png</image:loc><image:caption>image9Jan10202204370536PM</image:caption><image:title>image9Jan10202204370536PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2024-08-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-security-startup-cybereason-raises-4.6m-to-halt-hackers-in-real-time</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-releases-free-solution-to-detect-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/GSN-011-800x500.png</image:loc><image:caption>GSN011800x500</image:caption><image:title>GSN011800x500</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyberspies-linked-to-memento-ransomware-use-new-powershell-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bleeping%20Computer%20logo-Feb-03-2022-01-45-30-04-AM.png</image:loc><image:caption>BleepingComputerlogoFeb03202201453004AM</image:caption><image:title>BleepingComputerlogoFeb03202201453004AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-02-03</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/cybereason-security-services-team</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2024-01-25</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-ad-fraud-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ad-fraud-pt2-ep-217.png</image:loc><image:caption>adfraudpt2ep217</image:caption><image:title>adfraudpt2ep217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5).png</image:loc><image:caption>MaliciousLifeepisode5</image:caption><image:title>MaliciousLifeepisode5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Augustine-Fou.jpg</image:loc><image:caption>AugustineFou</image:caption><image:title>AugustineFou</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/how-do-initial-access-brokers-enable-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(19)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews191</image:caption><image:title>CopyofBLOGSOCIALSETNews191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-1.png</image:loc><image:caption>CybereasonBlogTemplate41</image:caption><image:title>CybereasonBlogTemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(2)-3.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews23</image:caption><image:title>CopyofBLOGSOCIALSETNews23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uk-us-blame-north-korea-for-wannacry-directly-responsible</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/russian-gru-officers-charged-with-laundry-list-of-cyberattacks-but-arrests-unlikely</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict%20logo-1.png</image:loc><image:caption>Verdictlogo1</image:caption><image:title>Verdictlogo1</image:title></image:image><lastmod>2020-10-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/funding-roundup-week-ending-2/14/14</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/vator_tv.jpg</image:loc><image:caption>vatortv</image:caption><image:title>vatortv</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/cyber-defenders-council</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/email-banners/Owl-Head-RSA-2.png</image:loc><image:caption>OwlHeadRSA2</image:caption><image:title>OwlHeadRSA2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-cityscape-dark.jpg</image:loc><image:caption>crbgcityscapedark</image:caption><image:title>crbgcityscapedark</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-security-council-report--defend-forward-thumb.jpg</image:loc><image:caption>crsecuritycouncilreportdefendforwardthumb</image:caption><image:title>crsecuritycouncilreportdefendforwardthumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cyber-defenders-council-logo.png</image:loc><image:caption>cyberdefenderscouncillogo</image:caption><image:title>cyberdefenderscouncillogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/NA%20EMEA%20Members/General%20Joseph%20Dunford.jpg</image:loc><image:caption>GeneralJosephDunford</image:caption><image:title>GeneralJosephDunford</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-defenders-council--will-regulation-reduce-cyber-risk--thumb.jpg</image:loc><image:caption>crdefenderscouncilwillregulationreducecyberriskthumb</image:caption><image:title>crdefenderscouncilwillregulationreducecyberriskthumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-virtual-city--no-gradient.jpg</image:loc><image:caption>crbgvirtualcitynogradient</image:caption><image:title>crbgvirtualcitynogradient</image:title></image:image><lastmod>2022-09-16</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/repeat-ransomware-attacks-hit-80-of-victims-who-paid-ransoms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Searchsecurity%20logo.jpg</image:loc><image:caption>Searchsecuritylogo</image:caption><image:title>Searchsecuritylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-06-16</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-next-generation-antivirus-ngav</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/next-generation-antivirus-ngav.png</image:loc><image:caption>nextgenerationantivirusngav</image:caption><image:title>nextgenerationantivirusngav</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV-redefined-blog-post-text.png</image:loc><image:caption>NGAVredefinedblogposttext</image:caption><image:title>NGAVredefinedblogposttext</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-23.jpg</image:loc><image:caption>Untitleddesign23</image:caption><image:title>Untitleddesign23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-02-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-hires-hussam-sidani-as-regional-vice-president-to-fuel-growth-in-the-middle-east-and-turkey</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-04-05</lastmod></url><url><loc>https://www.cybereason.com/blog/product/ransomware-lessons-underscore-need-for-layered-predictive-defenses</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(21).png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(11)-1.png</image:loc><image:caption>CybereasonBlogTemplate111</image:caption><image:title>CybereasonBlogTemplate111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(19).png</image:loc><image:caption>blogposttext19</image:caption><image:title>blogposttext19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/press/crn-recognizes-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-25</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-hacking-multi-factor-authentication</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/138%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>138MALICIOUSLIFE</image:caption><image:title>138MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Roger_Grimes.jpg</image:loc><image:caption>RogerGrimes</image:caption><image:title>RogerGrimes</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-28T090319.905.png</image:loc><image:caption>blogposttext20220928T090319905</image:caption><image:title>blogposttext20220928T090319905</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-09-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/covid-19-response-how-to-secure-a-100-remote-workforce</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity-5.jpg</image:loc><image:caption>Bankinfosecurity5</image:caption><image:title>Bankinfosecurity5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/press/andy-byron-hired-as-chief-revenue-officer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-13</lastmod></url><url><loc>https://www.cybereason.com/blog/exploit-kits-shade-into-new-territory</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image-125.png</image:loc><image:caption>image125</image:caption><image:title>image125</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-126.png</image:loc><image:caption>image126</image:caption><image:title>image126</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/why-an-it-mindset-is-risky-when-applied-to-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_87015182.jpg</image:loc><image:caption>shutterstock87015182</image:caption><image:title>shutterstock87015182</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ML146_2.png</image:loc><image:caption>ML1462</image:caption><image:title>ML1462</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/case-study-software-company-detects-and-closes-year-old-webmail-server-backdoor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_121344556r-1024x391.png</image:loc><image:caption>shutterstock121344556r1024x391</image:caption><image:title>shutterstock121344556r1024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/many-businesses-are-still-unprepared-for-ransomware-despite-past-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRadar%20logo-Dec-02-2021-01-53-19-08-AM.png</image:loc><image:caption>TechRadarlogoDec02202101531908AM</image:caption><image:title>TechRadarlogoDec02202101531908AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/press/security-industry-pioneer-art-coviello-joins-cybereason-board-of-directors-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-12-13</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-named-highest-rated-cloud-computing-company-to-work-for-by-battery-ventures</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(107).png</image:loc><image:caption>blogposttext107</image:caption><image:title>blogposttext107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CybereasonBlogHeroTemplate</image:caption><image:title>CybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20Hadar%20Harari.png</image:loc><image:caption>EmployeeSpotlightHadarHarari</image:caption><image:title>EmployeeSpotlightHadarHarari</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-03-11</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-to-the-prestigious-forbes-2022-cloud-100</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/phishing-campaign-uses-us-tax-season-to-lure-victims</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Beta%20News%20logo-2.png</image:loc><image:caption>BetaNewslogo2</image:caption><image:title>BetaNewslogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-03-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/botnet-backdoors-microsoft-exchange-servers-mines-cryptocurrency</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bleeping%20Computer%20logo-2.png</image:loc><image:caption>BleepingComputerlogo2</image:caption><image:title>BleepingComputerlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereasons-intelligence-group-examines-russia-and-their-methods-to-carry-out-global-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/attack-attribution-its-complicated</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_610447463-1.jpg</image:loc><image:caption>shutterstock6104474631</image:caption><image:title>shutterstock6104474631</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-attack-risk-heightens-during-holidays-finds-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IPT.Net%20logo.png</image:loc><image:caption>IPTNetlogo</image:caption><image:title>IPTNetlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-11-23</lastmod></url><url><loc>https://www.cybereason.com/threat-alert-molerats-middle-east-espionage-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/LOGIN_PASSWORDS_CR_ICONS-52.svg</image:loc><image:caption>LOGINPASSWORDSCRICONS52</image:caption><image:title>LOGINPASSWORDSCRICONS52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/BLOCKED_EXECUTABLE_CR_ICONS-32.svg</image:loc><image:caption>BLOCKEDEXECUTABLECRICONS32</image:caption><image:title>BLOCKEDEXECUTABLECRICONS32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines.png</image:loc><image:caption>crbghexagonlines</image:caption><image:title>crbghexagonlines</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/IMPACTEDGEO_GLOBE2_CR_ICONS-31.svg</image:loc><image:caption>IMPACTEDGEOGLOBE2CRICONS31</image:caption><image:title>IMPACTEDGEOGLOBE2CRICONS31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/TECH_DEEPDIVE_KNOWLEDGE_CR_ICONS-27.svg</image:loc><image:caption>TECHDEEPDIVEKNOWLEDGECRICONS27</image:caption><image:title>TECHDEEPDIVEKNOWLEDGECRICONS27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR2_CR_ICONS-11.png</image:loc><image:caption>EDR2CRICONS11</image:caption><image:title>EDR2CRICONS11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/REDUCE_FALSE_POSITIVES_CR_ICONS-18.svg</image:loc><image:caption>REDUCEFALSEPOSITIVESCRICONS18</image:caption><image:title>REDUCEFALSEPOSITIVESCRICONS18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PLATFORM3_CR_ICONS-03.svg</image:loc><image:caption>PLATFORM3CRICONS03</image:caption><image:title>PLATFORM3CRICONS03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PARTNER_SANDBOX_CR_ICONS-28.svg</image:loc><image:caption>PARTNERSANDBOXCRICONS28</image:caption><image:title>PARTNERSANDBOXCRICONS28</image:title></image:image><lastmod>2020-12-09</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-creating-security-budget-where-there-is-no-budget</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/krichards-0.jpeg</image:loc><image:caption>krichards0</image:caption><image:title>krichards0</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(1).png</image:loc><image:caption>CISOStoriespodcast1</image:caption><image:title>CISOStoriespodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(6).png</image:loc><image:caption>CISOStoriespodcast6</image:caption><image:title>CISOStoriespodcast6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/ravi-iyer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(25).png</image:loc><image:caption>CybereasonBlogTemplate25</image:caption><image:title>CybereasonBlogTemplate25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ravi%20Iyer%20CPO.png</image:loc><image:caption>RaviIyerCPO</image:caption><image:title>RaviIyerCPO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-fighting-the-fastest-growing-threat-ransomware-and-helping-small-businesses-along-the-way</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_296963486.jpg</image:loc><image:caption>shutterstock296963486</image:caption><image:title>shutterstock296963486</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/hafnium-and-solarwinds-attacks-highlight-lack-of-accountability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post%20(1).png</image:loc><image:caption>blogpost1</image:caption><image:title>blogpost1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-to-protect-yourself-from-coronavirus-themed-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/tech%20republic%20logo-1.png</image:loc><image:caption>techrepubliclogo1</image:caption><image:title>techrepubliclogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-sam-curry-honored-with-a-sc-media-30th-anniversary-visionary-award</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-03-21</lastmod></url><url><loc>https://www.cybereason.com/blog/insights-from-a-fireside-chat-on-ransomware-cloud-adoption-cisos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mic-Banner-A.png</image:loc><image:caption>MicBannerA</image:caption><image:title>MicBannerA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/softbank-invests-100-million-in-cybersecurity-startup</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/WSJ.png</image:loc><image:caption>WSJ</image:caption><image:title>WSJ</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecurity-the-other-elephant-on-the-campaign-trail</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Untitled-design-5.png</image:loc><image:caption>Untitleddesign5</image:caption><image:title>Untitleddesign5</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/how-the-malop-can-facilitate-new-breach-reporting-rules</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(98).png</image:loc><image:caption>blogposttext98</image:caption><image:title>blogposttext98</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRXDR.png</image:loc><image:caption>CRXDR</image:caption><image:title>CRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MALOP-Screen.jpg</image:loc><image:caption>MALOPScreen</image:caption><image:title>MALOPScreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-05-05</lastmod></url><url><loc>https://www.cybereason.com/press-releases/gartner-2019-customers-choice-award</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pi_cc_award_color_2019_320x400.png</image:loc><image:caption>piccawardcolor2019320x400</image:caption><image:title>piccawardcolor2019320x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2019-01-17</lastmod></url><url><loc>https://www.cybereason.com/resources/true-cost-of-ransomware/webinar/us/101822</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/True-Cost-Ransomware-10-18-22.png</image:loc><image:caption>TrueCostRansomware101822</image:caption><image:title>TrueCostRansomware101822</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2022-11-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/wanna-stay-safe-trash-that-internet-connected-security-camera</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Untitled-design-13.png</image:loc><image:caption>Untitleddesign13</image:caption><image:title>Untitleddesign13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-20</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-hosts-successful-first-secure-massachusetts-intelligence-briefing</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-continues-rapid-emea-expansion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-06-13</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/cybereason-people-team</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MassCyberCenter-blog.png</image:loc><image:caption>MassCyberCenterblog</image:caption><image:title>MassCyberCenterblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(25).png</image:loc><image:caption>blogposttext25</image:caption><image:title>blogposttext25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CybereasonBlogHeroTemplate</image:caption><image:title>CybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog_BestinBoston.png</image:loc><image:caption>BlogBestinBoston</image:caption><image:title>BlogBestinBoston</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/we-are-hiring-owl.png</image:loc><image:caption>wearehiringowl</image:caption><image:title>wearehiringowl</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(38).png</image:loc><image:caption>blogposttext38</image:caption><image:title>blogposttext38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20tim%20weiss.png</image:loc><image:caption>EmployeeSpotlighttimweiss</image:caption><image:title>EmployeeSpotlighttimweiss</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(25)-1.png</image:loc><image:caption>CybereasonBlogTemplate251</image:caption><image:title>CybereasonBlogTemplate251</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20Hadar%20Harari.png</image:loc><image:caption>EmployeeSpotlightHadarHarari</image:caption><image:title>EmployeeSpotlightHadarHarari</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20Sibel%20Narin-Farooq.png</image:loc><image:caption>EmployeeSpotlightSibelNarinFarooq</image:caption><image:title>EmployeeSpotlightSibelNarinFarooq</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20Dani%20Koretsky.png</image:loc><image:caption>EmployeeSpotlightDaniKoretsky</image:caption><image:title>EmployeeSpotlightDaniKoretsky</image:title></image:image><lastmod>2022-01-04</lastmod></url><url><loc>https://www.cybereason.com/blog/last-hurrah-executive-order-to-protect-iaas-platforms-from-malicious-actors</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(25).png</image:loc><image:caption>MaliciousLifeepisode25</image:caption><image:title>MaliciousLifeepisode25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/executive-order-blog-card.png</image:loc><image:caption>executiveorderblogcard</image:caption><image:title>executiveorderblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(15).png</image:loc><image:caption>MaliciousLifeepisode15</image:caption><image:title>MaliciousLifeepisode15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/tech-companies-weigh-responses-to-wikileaks-exposure-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/technews.jpg</image:loc><image:caption>technews</image:caption><image:title>technews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/why-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/defenders_owlsnoname%20(1).png</image:loc><image:caption>defendersowlsnoname1</image:caption><image:title>defendersowlsnoname1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__squares-with-hex.png</image:loc><image:caption>crshapestacksquareswithhex</image:caption><image:title>crshapestacksquareswithhex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--xdr-pattern.jpg</image:loc><image:caption>crbgheroxdrpattern</image:caption><image:title>crbgheroxdrpattern</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__why-third-hex-multi.png</image:loc><image:caption>crshapestackwhythirdhexmulti</image:caption><image:title>crshapestackwhythirdhexmulti</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-white-03.png</image:loc><image:caption>crbgsubtlewhite03</image:caption><image:title>crbgsubtlewhite03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__four-lines-185px.png</image:loc><image:caption>crshapestackfourlines185px</image:caption><image:title>crshapestackfourlines185px</image:title></image:image><lastmod>2024-04-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hack-of-computers-in-74-nations-using-nsa-bug-is-largest-cyber-attack-ever-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/The-McClatchy-Company-MNI.gif</image:loc><image:caption>TheMcClatchyCompanyMNI</image:caption><image:title>TheMcClatchyCompanyMNI</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/evolving-ransomware-tactics-include-recruiting-insiders-and-ddos-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(37).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews37</image:caption><image:title>CopyofBLOGSOCIALSETNews37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-27T072602.816.png</image:loc><image:caption>blogposttext20220727T072602816</image:caption><image:title>blogposttext20220727T072602816</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-what-is-the-wannacry-ransomware-attack-and-how-to-defend-against-it</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/ransomware-wanna-decryptor-virus-malware-sensorstechforum-wallpaper.jpg</image:loc><image:caption>ransomwarewannadecryptorvirusmalwaresensorstechforumwallpaper</image:caption><image:title>ransomwarewannadecryptorvirusmalwaresensorstechforumwallpaper</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-the-conficker-worm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-15.png</image:loc><image:caption>image115</image:caption><image:title>image115</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Stellar-Discovery_v2.png</image:loc><image:caption>BLOGStellarDiscoveryv2</image:caption><image:title>BLOGStellarDiscoveryv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-01-13</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-names-joe-odonnell-vice-president-of-channels-in-the-americas</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-10-07</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-kicks-off-octobers-national-cybersecurity-awareness-month-by-educating-citizens-on-the-dangers-of-cyberstalking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-09-26</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-alert-lemonduck-crypto-mining-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-10-24-46-01-PM.png</image:loc><image:caption>unnamedSep14202110244601PM</image:caption><image:title>unnamedSep14202110244601PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-53-53-18-PM.png</image:loc><image:caption>unnamedSep14202108535318PM</image:caption><image:title>unnamedSep14202108535318PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-10-23-54-86-PM.png</image:loc><image:caption>unnamedSep14202110235486PM</image:caption><image:title>unnamedSep14202110235486PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(2).png</image:loc><image:caption>ImagefromiOS2</image:caption><image:title>ImagefromiOS2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-10-21-50-05-PM.png</image:loc><image:caption>unnamedSep14202110215005PM</image:caption><image:title>unnamedSep14202110215005PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-10-25-57-20-PM.png</image:loc><image:caption>unnamedSep14202110255720PM</image:caption><image:title>unnamedSep14202110255720PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-10-22-48-92-PM.png</image:loc><image:caption>unnamedSep14202110224892PM</image:caption><image:title>unnamedSep14202110224892PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(1).png</image:loc><image:caption>CopyofThreatAlertAnalysis1</image:caption><image:title>CopyofThreatAlertAnalysis1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><lastmod>2022-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/hacker-summer-camp-is-cancelled-long-live-virtual-hacker-summer-camp</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ML146_2.png</image:loc><image:caption>ML1462</image:caption><image:title>ML1462</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(12).png</image:loc><image:caption>MaliciousLifeepisode12</image:caption><image:title>MaliciousLifeepisode12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mobile-Theatre-Dark-B.png</image:loc><image:caption>MobileTheatreDarkB</image:caption><image:title>MobileTheatreDarkB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/with-the-holidays-come-greater-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Dec-02-2021-02-10-07-45-AM.png</image:loc><image:caption>SCMagazinelogoDec02202102100745AM</image:caption><image:title>SCMagazinelogoDec02202102100745AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-endpoint-controls</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-endpoint-controls-product-brief--thumb.jpg</image:loc><image:caption>crendpointcontrolsproductbriefthumb</image:caption><image:title>crendpointcontrolsproductbriefthumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2022-01-26</lastmod></url><url><loc>https://www.cybereason.com/blog/partners-in-crime-how-ransomware-gangs-are-working-together</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(38).png</image:loc><image:caption>CybereasonBlogTemplate38</image:caption><image:title>CybereasonBlogTemplate38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(13).png</image:loc><image:caption>blogposttext13</image:caption><image:title>blogposttext13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(1)-2.png</image:loc><image:caption>CybereasonBlogTemplate12</image:caption><image:title>CybereasonBlogTemplate12</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/resources/mitre-attack-resources</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Split_1920x1080.jpg</image:loc><image:caption>Split1920x1080</image:caption><image:title>Split1920x1080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2020-06-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/solarwinds-hackers-found-conducting-widespread-spear-phishing-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TEISS%20logo-Jun-02-2021-12-30-11-65-PM.png</image:loc><image:caption>TEISSlogoJun02202112301165PM</image:caption><image:title>TEISSlogoJun02202112301165PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-06-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fakespy-android-malware-spread-via-postal-service-apps</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Post%20logo.jpg</image:loc><image:caption>ThreatPostlogo</image:caption><image:title>ThreatPostlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-07-15</lastmod></url><url><loc>https://www.cybereason.com/blog/secops-getting-behind-the-wheel-with-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(76).png</image:loc><image:caption>blogposttext76</image:caption><image:title>blogposttext76</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(39).png</image:loc><image:caption>blogposttext39</image:caption><image:title>blogposttext39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-02T094421.274.png</image:loc><image:caption>blogposttext20220602T094421274</image:caption><image:title>blogposttext20220602T094421274</image:title></image:image><lastmod>2022-03-25</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-continues-global-expansion-with-sydney-office-signs-distribution-agreement-for-australia-new-zealand</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-pledges-50-million-in-free-enterprise-software-</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-extending-detection-and-response-to-the-cloud</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Kathy%20Wang.png</image:loc><image:caption>KathyWang</image:caption><image:title>KathyWang</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-1.png</image:loc><image:caption>CISOStoriestemplate71</image:caption><image:title>CISOStoriestemplate71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/blog/how-do-ransomware-attacks-impact-victim-organizations-stock</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(75).png</image:loc><image:caption>blogposttext75</image:caption><image:title>blogposttext75</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(99).png</image:loc><image:caption>blogposttext99</image:caption><image:title>blogposttext99</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-2.png</image:loc><image:caption>CybereasonBlogTemplate32</image:caption><image:title>CybereasonBlogTemplate32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-match-made-in-heaven-lockheed-martin-partners-with-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-researcher-discovers-vaccine-for-badrabbit-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image5.png</image:loc><image:caption>image5</image:caption><image:title>image5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2.png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4.png</image:loc><image:caption>image4</image:caption><image:title>image4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6.png</image:loc><image:caption>image6</image:caption><image:title>image6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3.png</image:loc><image:caption>image3</image:caption><image:title>image3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Pasted%20image%20at%202017_10_24%2004_53%20PM.png</image:loc><image:caption>Pastedimageat201710240453PM</image:caption><image:title>Pastedimageat201710240453PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7.png</image:loc><image:caption>image7</image:caption><image:title>image7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1.png</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Pasted%20image%20at%202017_10_24%2004_37%20PM.png</image:loc><image:caption>Pastedimageat201710240437PM</image:caption><image:title>Pastedimageat201710240437PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/ilan-sokol</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ilan%20Sokol.png</image:loc><image:caption>IlanSokol</image:caption><image:title>IlanSokol</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-09-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fancy-bears-release-data-on-footballers-tue-drug-use-after-new-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-operation-kofer-mutates-to-avoid-detection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Infosecurity-Magazine.png</image:loc><image:caption>InfosecurityMagazine</image:caption><image:title>InfosecurityMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/to-pay-or-not-to-pay</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware-blog-hero.jpg</image:loc><image:caption>Ransomwarebloghero</image:caption><image:title>Ransomwarebloghero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fridays-massive-ddos-attack-attributed-in-part-to-mirai-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/GSN-011-800x500-1.png</image:loc><image:caption>GSN011800x5001</image:caption><image:title>GSN011800x5001</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-petya-like-ransomware-attack-what-you-need-to-know</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/petya-banner.png</image:loc><image:caption>petyabanner</image:caption><image:title>petyabanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ragnar-locker-ransomware-targets-energy-sector-cybereason-suggests</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Sep-01-2022-08-36-58-28-PM.png</image:loc><image:caption>InfosecurityMagazinelogoSep01202208365828PM</image:caption><image:title>InfosecurityMagazinelogoSep01202208365828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-09-01</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-achieving-security-buy-in-change-approach-not-culture</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5).png</image:loc><image:caption>CISOStoriestemplate5</image:caption><image:title>CISOStoriestemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(11)-1.png</image:loc><image:caption>pastedimage0111</image:caption><image:title>pastedimage0111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-leadership-security-executive-career</loc><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_731706145.jpg</image:loc><image:caption>shutterstock731706145</image:caption><image:title>shutterstock731706145</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(8).png</image:loc><image:caption>CISOStoriespodcast8</image:caption><image:title>CISOStoriespodcast8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-07-19</lastmod></url><url><loc>https://www.cybereason.com/blog/why-cybereason-is-a-2022-gartner-magic-quadrant-leader</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason-private-infrastructure-protection-gartner-magic-quadrant.png</image:loc><image:caption>Cybereasonprivateinfrastructureprotectiongartnermagicquadrant</image:caption><image:title>Cybereasonprivateinfrastructureprotectiongartnermagicquadrant</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T072538.395.png</image:loc><image:caption>blogposttext20220920T072538395</image:caption><image:title>blogposttext20220920T072538395</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(100).png</image:loc><image:caption>blogposttext100</image:caption><image:title>blogposttext100</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-03-09</lastmod></url><url><loc>https://www.cybereason.com/blog/revil-ransomware-attacks-implications-for-kaseya-msps-and-businesses</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(27).png</image:loc><image:caption>CybereasonBlogTemplate27</image:caption><image:title>CybereasonBlogTemplate27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><lastmod>2021-08-09</lastmod></url><url><loc>https://www.cybereason.com/blog/t-mobile-data-breach-amplifies-larger-cybersecurity-challenge</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(35).png</image:loc><image:caption>CybereasonBlogTemplate35</image:caption><image:title>CybereasonBlogTemplate35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-08-20</lastmod></url><url><loc>https://www.cybereason.com/blog/operational-resilience-bridging-the-communications-gap</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(126).png</image:loc><image:caption>blogposttext126</image:caption><image:title>blogposttext126</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(122).png</image:loc><image:caption>blogposttext122</image:caption><image:title>blogposttext122</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(53).png</image:loc><image:caption>blogposttext53</image:caption><image:title>blogposttext53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><lastmod>2022-03-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-discusses-risks-associated-with-online-holiday-shopping</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/New-England-Cable-News-logo.jpg</image:loc><image:caption>NewEnglandCableNewslogo</image:caption><image:title>NewEnglandCableNewslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-oracle-announce-strategic-partnership</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Buzz%20logo.jpg</image:loc><image:caption>ChannelBuzzlogo</image:caption><image:title>ChannelBuzzlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/gallium-the-newest-threat-group-on-microsofts-radar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-4.jpg</image:loc><image:caption>DarkReadinglogo4</image:caption><image:title>DarkReadinglogo4</image:title></image:image><lastmod>2020-01-14</lastmod></url><url><loc>https://www.cybereason.com/consulting/incident-response-plans-tabletop-exercises</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-spine-bg--endpoint-protection-d.jpg</image:loc><image:caption>crplatformspinebgendpointprotectiond</image:caption><image:title>crplatformspinebgendpointprotectiond</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILITY_HUNTING_CR_ICONS-13.svg</image:loc><image:caption>VISIBILITYHUNTINGCRICONS13</image:caption><image:title>VISIBILITYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ben-demonte.jpg</image:loc><image:caption>bendemonte</image:caption><image:title>bendemonte</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DurrantProfilePic2025.png</image:loc><image:caption>DurrantProfilePic2025</image:caption><image:title>DurrantProfilePic2025</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-preventid-flipped.png</image:loc><image:caption>crowlshowcasepreventidflipped</image:caption><image:title>crowlshowcasepreventidflipped</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/SAVINGS_CR_ICONS-38.svg</image:loc><image:caption>SAVINGSCRICONS38</image:caption><image:title>SAVINGSCRICONS38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/QUESTION_CHECKMARK_CR_ICONS-42.svg</image:loc><image:caption>QUESTIONCHECKMARKCRICONS42</image:caption><image:title>QUESTIONCHECKMARKCRICONS42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-hero-protector-with-hex-bg.png</image:loc><image:caption>crheroprotectorwithhexbg</image:caption><image:title>crheroprotectorwithhexbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-spine-bg--posture-incident-management-d.jpg</image:loc><image:caption>crplatformspinebgpostureincidentmanagementd</image:caption><image:title>crplatformspinebgpostureincidentmanagementd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-spine-bg--endpoint-protection-clean-m.jpg</image:loc><image:caption>crplatformspinebgendpointprotectioncleanm</image:caption><image:title>crplatformspinebgendpointprotectioncleanm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/michael-quinn.webp</image:loc><image:caption>michaelquinn</image:caption><image:title>michaelquinn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(36).png</image:loc><image:caption>BLOGImagesTemplatev236</image:caption><image:title>BLOGImagesTemplatev236</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Mitre%20Blog%202026.png</image:loc><image:caption>CybereasonMitreBlog2026</image:caption><image:title>CybereasonMitreBlog2026</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereasons-first-ever-mssp-program-expands-offerings-to-partners</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRNtv%20logo-2.png</image:loc><image:caption>CRNtvlogo2</image:caption><image:title>CRNtvlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-04-06</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-commissions-2017-threat-hunting-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/u.s.-charges-3-chinese-with-hacking-but-stops-short-of-blaming-beijing-directly</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/McClatchy%20News.jpg</image:loc><image:caption>McClatchyNews</image:caption><image:title>McClatchyNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ip-theft-declining-or-just-more-stealthy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/NetworkWorld-1.png</image:loc><image:caption>NetworkWorld1</image:caption><image:title>NetworkWorld1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/building-enterprise-immunity-with-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8994.jpg</image:loc><image:caption>IMG8994</image:caption><image:title>IMG8994</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/XDR_Immunity.png</image:loc><image:caption>XDRImmunity</image:caption><image:title>XDRImmunity</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(74).png</image:loc><image:caption>blogposttext74</image:caption><image:title>blogposttext74</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(64).png</image:loc><image:caption>blogposttext64</image:caption><image:title>blogposttext64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-01-10</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/tony-bradley</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Healthcare%20Security%20Requires.png</image:loc><image:caption>HealthcareSecurityRequires</image:caption><image:title>HealthcareSecurityRequires</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(6)-2.png</image:loc><image:caption>CybereasonBlogTemplate62</image:caption><image:title>CybereasonBlogTemplate62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/tony-author.png</image:loc><image:caption>tonyauthor</image:caption><image:title>tonyauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(41).png</image:loc><image:caption>CybereasonBlogTemplate41</image:caption><image:title>CybereasonBlogTemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/resources/how-to-strengthen-your-cyber-security-in-a-highly-regulated-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/How-to-Strengthen-Cyber-Security-Regulated-World-03.07.24.png</image:loc><image:caption>HowtoStrengthenCyberSecurityRegulatedWorld030724</image:caption><image:title>HowtoStrengthenCyberSecurityRegulatedWorld030724</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-05-21</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-black-hat-live-beyond-infiltration-conquering-all-stages-of-the-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Full-width-image-for-infiltration-blog-1000x391.jpg</image:loc><image:caption>Fullwidthimageforinfiltrationblog1000x391</image:caption><image:title>Fullwidthimageforinfiltrationblog1000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(21).png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cybereason-ciso-interview-series-you-cant-do-security-in-a-bubble</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Bergamo-Headshot.jpg</image:loc><image:caption>BergamoHeadshot</image:caption><image:title>BergamoHeadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(9).png</image:loc><image:caption>CISOStoriestemplate9</image:caption><image:title>CISOStoriestemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/09132017_feature_image.jpg</image:loc><image:caption>09132017featureimage</image:caption><image:title>09132017featureimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-is-armed-to-combat-cyber-arson</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20ME%20Logo.png</image:loc><image:caption>ChannelMELogo</image:caption><image:title>ChannelMELogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/deep-2018-cybersecurity-conference-agenda-request-invite</loc><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/background%20layers/Quote_Mark.svg</image:loc><image:caption>QuoteMark</image:caption><image:title>QuoteMark</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/Email%20Marketing%20Images/EventBrite_Header.png</image:loc><image:caption>EventBriteHeader</image:caption><image:title>EventBriteHeader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DEEP%202018/2018_06_06_Deep_Animation.gif</image:loc><image:caption>20180606DeepAnimation</image:caption><image:title>20180606DeepAnimation</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/LOGO-Web-Horizontal-Mono.png</image:loc><image:caption>LOGOWebHorizontalMono</image:caption><image:title>LOGOWebHorizontalMono</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/blog/next-generation-antivirus-prevention-redefined</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason-NGAV-Prevention.png</image:loc><image:caption>CybereasonNGAVPrevention</image:caption><image:title>CybereasonNGAVPrevention</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-2.jpg</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/9-layers--cybereason-NGAV%20(1).png</image:loc><image:caption>9layerscybereasonNGAV1</image:caption><image:title>9layerscybereasonNGAV1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113218.959.png</image:loc><image:caption>blogposttext20220920T113218959</image:caption><image:title>blogposttext20220920T113218959</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2023-02-22</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-in-defense-of-the-nsa</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-144.png</image:loc><image:caption>MaliciousLife144</image:caption><image:title>MaliciousLife144</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/134%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>134MALICIOUSLIFE1</image:caption><image:title>134MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ira%20winkler.png</image:loc><image:caption>irawinkler</image:caption><image:title>irawinkler</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20to%20Not%20Build%20a%20Cybersecurity%20Startup-1.png</image:loc><image:caption>HowtoNotBuildaCybersecurityStartup1</image:caption><image:title>HowtoNotBuildaCybersecurityStartup1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-11-01</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/ck-chim</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/exdr-buyers-guide-23-blog-featured.png</image:loc><image:caption>exdrbuyersguide23blogfeatured</image:caption><image:title>exdrbuyersguide23blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cybereason-sdr-evolution-blog-featured-2.png</image:loc><image:caption>cybereasonsdrevolutionblogfeatured2</image:caption><image:title>cybereasonsdrevolutionblogfeatured2</image:title></image:image><lastmod>2023-10-23</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-wins-top-award-at-it-security-leadership-exchange</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-07-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecuritys-inconvenient-truth-the-nation-state-threat-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-1.png</image:loc><image:caption>Bankinfosecuritylogo1</image:caption><image:title>Bankinfosecuritylogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-10-28</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-lummastealer-2.0</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Attack%20Tree%2c%20mshta.png</image:loc><image:caption>AttackTreemshta</image:caption><image:title>AttackTreemshta</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Attack%20Tree%2c%20powershell.png</image:loc><image:caption>AttackTreepowershell</image:caption><image:title>AttackTreepowershell</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Lot%20information%20.png</image:loc><image:caption>Lotinformation</image:caption><image:title>Lotinformation</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(11).png</image:loc><image:caption>BLOGImagesTemplatev211</image:caption><image:title>BLOGImagesTemplatev211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Picture4.png</image:loc><image:caption>Picture4</image:caption><image:title>Picture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/LummaStealer.v2%20successful%20deployment%20.png</image:loc><image:caption>LummaStealerv2successfuldeployment</image:caption><image:title>LummaStealerv2successfuldeployment</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Official%20documentation%20.png</image:loc><image:caption>Officialdocumentation</image:caption><image:title>Officialdocumentation</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/LummaMarket%20UI%20.png</image:loc><image:caption>LummaMarketUI</image:caption><image:title>LummaMarketUI</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Cryptocurrency%20withdrawal%20UI.png</image:loc><image:caption>CryptocurrencywithdrawalUI</image:caption><image:title>CryptocurrencywithdrawalUI</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Rating%20system%20.png</image:loc><image:caption>Ratingsystem</image:caption><image:title>Ratingsystem</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Machine%20Timeline%2c%20Phishing%20Evidence.png</image:loc><image:caption>MachineTimelinePhishingEvidence</image:caption><image:title>MachineTimelinePhishingEvidence</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Data%20Buyer%20.png</image:loc><image:caption>DataBuyer</image:caption><image:title>DataBuyer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/evgeny.png</image:loc><image:caption>evgeny</image:caption><image:title>evgeny</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Picture5.png</image:loc><image:caption>Picture5</image:caption><image:title>Picture5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/jun.jpg</image:loc><image:caption>jun</image:caption><image:title>jun</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/mikol.png</image:loc><image:caption>mikol</image:caption><image:title>mikol</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(15).png</image:loc><image:caption>BLOGImagesTemplatev215</image:caption><image:title>BLOGImagesTemplatev215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Picture2.png</image:loc><image:caption>Picture2</image:caption><image:title>Picture2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/changelog%20analysis.png</image:loc><image:caption>changeloganalysis</image:caption><image:title>changeloganalysis</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/market%20logo.png</image:loc><image:caption>marketlogo</image:caption><image:title>marketlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/VirusTotal.%20(n.d.).%20.png</image:loc><image:caption>VirusTotalnd</image:caption><image:title>VirusTotalnd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Picture7.png</image:loc><image:caption>Picture7</image:caption><image:title>Picture7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Cybereason%20EDR%20solution%20.png</image:loc><image:caption>CybereasonEDRsolution</image:caption><image:title>CybereasonEDRsolution</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/elena-odier.png</image:loc><image:caption>elenaodier</image:caption><image:title>elenaodier</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-part-1-analysis-blog-analysis-featured.png</image:loc><image:caption>cuckoospearpart1analysisbloganalysisfeatured</image:caption><image:title>cuckoospearpart1analysisbloganalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Compromised%20store%20.png</image:loc><image:caption>Compromisedstore</image:caption><image:title>Compromisedstore</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Picture3.png</image:loc><image:caption>Picture3</image:caption><image:title>Picture3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/mark-tsipershtein-hs.png</image:loc><image:caption>marktsipershteinhs</image:caption><image:title>marktsipershteinhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Advertisement%20.png</image:loc><image:caption>Advertisement</image:caption><image:title>Advertisement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Picture8.png</image:loc><image:caption>Picture8</image:caption><image:title>Picture8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Picture1.png</image:loc><image:caption>Picture1</image:caption><image:title>Picture1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/output.png</image:loc><image:caption>output</image:caption><image:title>output</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/celebrating%20two%20years%20.png</image:loc><image:caption>celebratingtwoyears</image:caption><image:title>celebratingtwoyears</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Search%20and%20filter%20.png</image:loc><image:caption>Searchandfilter</image:caption><image:title>Searchandfilter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/Picture6.png</image:loc><image:caption>Picture6</image:caption><image:title>Picture6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/patryk.jpg</image:loc><image:caption>patryk</image:caption><image:title>patryk</image:title></image:image><lastmod>2025-05-02</lastmod></url><url><loc>https://www.cybereason.com/protecting-manufacturing-industry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/platform-bg-shape-sm.png</image:loc><image:caption>platformbgshapesm</image:caption><image:title>platformbgshapesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gray-bg.jpg</image:loc><image:caption>graybg</image:caption><image:title>graybg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Manufacturing%20-%20image%20with%20filter%20and%20textures%20(1).png</image:loc><image:caption>Manufacturingimagewithfilterandtextures1</image:caption><image:title>Manufacturingimagewithfilterandtextures1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-arm-landing-hero.jpg</image:loc><image:caption>crarmlandinghero</image:caption><image:title>crarmlandinghero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/rti-surgical-white.png</image:loc><image:caption>rtisurgicalwhite</image:caption><image:title>rtisurgicalwhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Flowserve_Logo.svg</image:loc><image:caption>FlowserveLogo</image:caption><image:title>FlowserveLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Motorola_Logo_White.svg</image:loc><image:caption>MotorolaLogoWhite</image:caption><image:title>MotorolaLogoWhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Manufacturing-Video-Start.png</image:loc><image:caption>ManufacturingVideoStart</image:caption><image:title>ManufacturingVideoStart</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2019-02-11</lastmod></url><url><loc>https://www.cybereason.com/blog/how-much-does-a-ransomware-attack-cost</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(110).png</image:loc><image:caption>blogposttext110</image:caption><image:title>blogposttext110</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware.png</image:loc><image:caption>ransomware</image:caption><image:title>ransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_690887317.jpg</image:loc><image:caption>shutterstock690887317</image:caption><image:title>shutterstock690887317</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-why-arent-there-more-bug-bounty-programs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/RanBarZik.jpg</image:loc><image:caption>RanBarZik</image:caption><image:title>RanBarZik</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/bug-bounty-programs-ep-221.png</image:loc><image:caption>bugbountyprogramsep221</image:caption><image:title>bugbountyprogramsep221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-warns-global-critical-infrastructure-operators-after-attacks-from-ragnar-locker-ransomware-gang</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20MEA%20logo-2.png</image:loc><image:caption>SecurityMEAlogo2</image:caption><image:title>SecurityMEAlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-10-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/honda-ransomware-confirms-findings-of-industrial-honeypot-research</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Week%20logo-2.png</image:loc><image:caption>SecurityWeeklogo2</image:caption><image:title>SecurityWeeklogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-06-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/its-about-as-serious-as-it-gets-say-sam-curry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Dec-14-2021-03-06-57-13-AM.png</image:loc><image:caption>BankinfosecuritylogoDec14202103065713AM</image:caption><image:title>BankinfosecuritylogoDec14202103065713AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-may-25th-organizations-at-risk-ransomware-attackers-dont-take-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(77).png</image:loc><image:caption>blogposttext77</image:caption><image:title>blogposttext77</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-circle-headshot.png</image:loc><image:caption>jjcircleheadshot</image:caption><image:title>jjcircleheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(23).png</image:loc><image:caption>CybereasonBlogTemplate23</image:caption><image:title>CybereasonBlogTemplate23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/maggie-circle-headshot.png</image:loc><image:caption>maggiecircleheadshot</image:caption><image:title>maggiecircleheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-05-05</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-operation-kudo</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-224-Card.png</image:loc><image:caption>MLEp224Card</image:caption><image:title>MLEp224Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(14).png</image:loc><image:caption>MaliciousLifeepisode14</image:caption><image:title>MaliciousLifeepisode14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/why-no-company-ever-needs-to-pay-a-ransomware-demand</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybersecurity%20ASEAN%20logo-1.jpg</image:loc><image:caption>CybersecurityASEANlogo1</image:caption><image:title>CybersecurityASEANlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://www.cybereason.com/blog/fbi-vs.-revil-ml-bside</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4)-1.png</image:loc><image:caption>MaliciousLifeepisode41</image:caption><image:title>MaliciousLifeepisode41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MLPodcast143.png</image:loc><image:caption>MLPodcast143</image:caption><image:title>MLPodcast143</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(2)-1.png</image:loc><image:caption>MaliciousLifeTemplate21</image:caption><image:title>MaliciousLifeTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/5g-security-flaws-pose-serious-threat-to-safety-experts-warn</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict-Logo-9.jpg</image:loc><image:caption>VerdictLogo9</image:caption><image:title>VerdictLogo9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/malware-attack-targets-it-systems-at-police-federation-headquarters</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Teiss%20Logo-1.jpg</image:loc><image:caption>TeissLogo1</image:caption><image:title>TeissLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-04-03</lastmod></url><url><loc>https://www.cybereason.com/blog/malop-vs-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T112617.289.png</image:loc><image:caption>blogposttext20221003T112617289</image:caption><image:title>blogposttext20221003T112617289</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-07-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uk-water-supplier-hit-by-extremely-concerning-cyberattack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bloomberg%20News%20logo-4.png</image:loc><image:caption>BloombergNewslogo4</image:caption><image:title>BloombergNewslogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2022-08-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-target-pfizer-exposing-sensitive-patient-information</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20National%20(Middle%20East)%20logo.png</image:loc><image:caption>TheNationalMiddleEastlogo</image:caption><image:title>TheNationalMiddleEastlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-10-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hacktivists-hit-belarusian-railroad-to-stop-russian-troops</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-Jan-29-2022-03-33-26-82-PM.png</image:loc><image:caption>DatabreachtodaylogoJan29202203332682PM</image:caption><image:title>DatabreachtodaylogoJan29202203332682PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-jailbreaking-tractors</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jailbreaking%20Tractors-1.png</image:loc><image:caption>JailbreakingTractors1</image:caption><image:title>JailbreakingTractors1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-could-a-hacker-with-a-usb-stick-actually-access-at-mar-a-lago</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Wash%20Post%20Logo-3.png</image:loc><image:caption>WashPostLogo3</image:caption><image:title>WashPostLogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-04-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/assume-that-youre-already-compromised</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CRN-TV1.jpg</image:loc><image:caption>CRNTV1</image:caption><image:title>CRNTV1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/careers/product</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Danielle%20Wood.png</image:loc><image:caption>UbUSpotlightDanielleWood</image:caption><image:title>UbUSpotlightDanielleWood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blue_concrete.jpg</image:loc><image:caption>blueconcrete</image:caption><image:title>blueconcrete</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/play-btn.png</image:loc><image:caption>playbtn</image:caption><image:title>playbtn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/car-image23.png</image:loc><image:caption>carimage23</image:caption><image:title>carimage23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/car-image101.png</image:loc><image:caption>carimage101</image:caption><image:title>carimage101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/Product-01.jpg</image:loc><image:caption>Product01</image:caption><image:title>Product01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Josh%20Moody-1.png</image:loc><image:caption>UbUSpotlightJoshMoody1</image:caption><image:title>UbUSpotlightJoshMoody1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/portal-terms-of-service</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-10-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-warns-of-fast-moving-black-basta-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Searchsecurity%20logo-Nov-23-2022-03-33-58-2553-PM.jpg</image:loc><image:caption>SearchsecuritylogoNov2320220333582553PM</image:caption><image:title>SearchsecuritylogoNov2320220333582553PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-11-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-adds-new-cybereason-xdr-for-cloud-workloads-to-fully-extend-detection-and-response-into-the-cloud</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Buzz%20logo-4.jpg</image:loc><image:caption>ChannelBuzzlogo4</image:caption><image:title>ChannelBuzzlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/esg-research-report-2021-endpoint-security-trends</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/esg-2021-endpoint-security-screen-3.png</image:loc><image:caption>esg2021endpointsecurityscreen3</image:caption><image:title>esg2021endpointsecurityscreen3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/esg-2021-endpoint-security-screen-2.png</image:loc><image:caption>esg2021endpointsecurityscreen2</image:caption><image:title>esg2021endpointsecurityscreen2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/esg-2021-endpoint-security-screen-1.png</image:loc><image:caption>esg2021endpointsecurityscreen1</image:caption><image:title>esg2021endpointsecurityscreen1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/esg-2021-endpoint-security-trends.png</image:loc><image:caption>esg2021endpointsecuritytrends</image:caption><image:title>esg2021endpointsecuritytrends</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/esg-endpoint-security-trends-report-fi.jpg</image:loc><image:caption>esgendpointsecuritytrendsreportfi</image:caption><image:title>esgendpointsecuritytrendsreportfi</image:title></image:image><lastmod>2022-01-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/facebook-data-exposure-lessons-to-learn</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Govinfosecurity.com%20logo-1.jpg</image:loc><image:caption>Govinfosecuritycomlogo1</image:caption><image:title>Govinfosecuritycomlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecurity-firm-cybereason-uncovers-chinese-espionage-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC%20logo-May-09-2022-02-54-42-98-PM.png</image:loc><image:caption>CNBClogoMay09202202544298PM</image:caption><image:title>CNBClogoMay09202202544298PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-why-arent-smbs-investing-in-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(2).png</image:loc><image:caption>Maliciouslifepodcast2</image:caption><image:title>Maliciouslifepodcast2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Josh_Ablett.jpg</image:loc><image:caption>JoshAblett</image:caption><image:title>JoshAblett</image:title></image:image><lastmod>2022-02-07</lastmod></url><url><loc>https://www.cybereason.com/resources/integrating-endpoint-and-mobile-device-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mobile-endpoints-hero-1.png</image:loc><image:caption>mobileendpointshero1</image:caption><image:title>mobileendpointshero1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-06-07</lastmod></url><url><loc>https://www.cybereason.com/blog/advanced-persistent-threats-and-the-board-moving-past-fud</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/bg-dark-jelly.jpg</image:loc><image:caption>bgdarkjelly</image:caption><image:title>bgdarkjelly</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-233-Card.png</image:loc><image:caption>MLEp233Card</image:caption><image:title>MLEp233Card</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alert-molerats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-12-09</lastmod></url><url><loc>https://www.cybereason.com/blog/adopt-a-post-breach-mentality-dont-just-protect-detect</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/the-challenge-of-offensive-hacking-the-nsa-and-zero-days</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Headshot%20(1)-1.jpg</image:loc><image:caption>Headshot11</image:caption><image:title>Headshot11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4).png</image:loc><image:caption>MaliciousLifeepisode4</image:caption><image:title>MaliciousLifeepisode4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/apts-the-board-and-you</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-05T074007.547.png</image:loc><image:caption>blogposttext20220805T074007547</image:caption><image:title>blogposttext20220805T074007547</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T075722.062.png</image:loc><image:caption>blogposttext20220725T075722062</image:caption><image:title>blogposttext20220725T075722062</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_190197608-1024x391.jpg</image:loc><image:caption>shutterstock1901976081024x391</image:caption><image:title>shutterstock1901976081024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/honeypot-highlights-danger-to-ics-systems-from-criminal-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/securityweek-3.png</image:loc><image:caption>securityweek3</image:caption><image:title>securityweek3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2018-08-16</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-wikileaks-vault-7-leak-details</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/On-Prem-Vault-Header.png</image:loc><image:caption>OnPremVaultHeader</image:caption><image:title>OnPremVaultHeader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-02-02</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-interview-special-graham-cluley</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/32%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>32MALICIOUSLIFE</image:caption><image:title>32MALICIOUSLIFE</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fakespy-android-malware-targets-royal-mail-app-users</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ComputerWeekly%20logo-1.jpg</image:loc><image:caption>ComputerWeeklylogo1</image:caption><image:title>ComputerWeeklylogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-07-15</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/yaron-cohen</loc><image:image><image:loc>https://www.cybereason.com/hubfs/T03CSH6QK-U4ESR8KN2-194b6f22d2f8-512.jpg</image:loc><image:caption>T03CSH6QKU4ESR8KN2194b6f22d2f8512</image:caption><image:title>T03CSH6QKU4ESR8KN2194b6f22d2f8512</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Deep%20REspond-2.jpg</image:loc><image:caption>DeepREspond2</image:caption><image:title>DeepREspond2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(89).png</image:loc><image:caption>blogposttext89</image:caption><image:title>blogposttext89</image:title></image:image><lastmod>2022-04-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/funding-daily-sleepy-cute-pug-edition</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/vb.jpg</image:loc><image:caption>vb</image:caption><image:title>vb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-ngav</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-ngav-redefined--v4-thumbnail.jpg</image:loc><image:caption>crngavredefinedv4thumbnail</image:caption><image:title>crngavredefinedv4thumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2024-03-08</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cyber-crime-adds-a-powerful-new-weapon-to-the-terrorists-arsenal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee.png</image:loc><image:caption>Employee</image:caption><image:title>Employee</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-announcement-blog-featured.png</image:loc><image:caption>onpremannouncementblogfeatured</image:caption><image:title>onpremannouncementblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Stock%20images/Woman%20in%20balaclava%20using%20laptop%20in%20the%20office-2.jpeg</image:loc><image:caption>Womaninbalaclavausinglaptopintheoffice2</image:caption><image:title>Womaninbalaclavausinglaptopintheoffice2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-02-17</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-what-its-like-to-fight-lulzsec</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Karim_Hijazi.jpg</image:loc><image:caption>KarimHijazi</image:caption><image:title>KarimHijazi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(12).png</image:loc><image:caption>MaliciousLifeepisode12</image:caption><image:title>MaliciousLifeepisode12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(29).png</image:loc><image:caption>MaliciousLifeepisode29</image:caption><image:title>MaliciousLifeepisode29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><lastmod>2022-09-28</lastmod></url><url><loc>https://www.cybereason.com/careers/rd</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chris%20Black%20lockpicking.jpg</image:loc><image:caption>ChrisBlacklockpicking</image:caption><image:title>ChrisBlacklockpicking</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/R&amp;D-01.jpg</image:loc><image:caption>RD01</image:caption><image:title>RD01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Danielle%20Wood.png</image:loc><image:caption>UbUSpotlightDanielleWood</image:caption><image:title>UbUSpotlightDanielleWood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/play-btn.png</image:loc><image:caption>playbtn</image:caption><image:title>playbtn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A1291.jpg</image:loc><image:caption>D0A1291</image:caption><image:title>D0A1291</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blue_concrete.jpg</image:loc><image:caption>blueconcrete</image:caption><image:title>blueconcrete</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/car-image101.png</image:loc><image:caption>carimage101</image:caption><image:title>carimage101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-terrorism-how-the-security-technology-community-can-help</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-nocturnus-researchers-discover-widescale-hacking-campaign-targeting-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-03-17</lastmod></url><url><loc>https://www.cybereason.com/blog/leveraging-xdr-for-cloud-workload-protection-cwpp</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T072315.427.png</image:loc><image:caption>blogposttext20220913T072315427</image:caption><image:title>blogposttext20220913T072315427</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR_XDR.png</image:loc><image:caption>EDRXDR</image:caption><image:title>EDRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(15).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews15</image:caption><image:title>CopyofBLOGSOCIALSETNews15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/press/top-cia-executive-joins-cybereason-advisory-board</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/ubu-cybereason-rainbow-lights-at-the-hancock-tower</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Operation-Rainbow-51.jpg</image:loc><image:caption>OperationRainbow51</image:caption><image:title>OperationRainbow51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Mike%20Volep.jpeg</image:loc><image:caption>MikeVolep</image:caption><image:title>MikeVolep</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/nearly-73500-patients-data-affected-in-ransomware-attack-on-eye-clinic-in-spore</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Straights%20Times%20logo.jpg</image:loc><image:caption>TheStraightsTimeslogo</image:caption><image:title>TheStraightsTimeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-08-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-attacks-targeting-industrial-control-systems-on-the-rise</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CW_Logo-hero-1.jpg</image:loc><image:caption>CWLogohero1</image:caption><image:title>CWLogohero1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2019-04-03</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/jj-cranford</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(1).png</image:loc><image:caption>CybereasonBlogTemplate1</image:caption><image:title>CybereasonBlogTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(116).png</image:loc><image:caption>blogposttext116</image:caption><image:title>blogposttext116</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware-blog.png</image:loc><image:caption>Ransomwareblog</image:caption><image:title>Ransomwareblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mitre-graphic-updated.png</image:loc><image:caption>mitregraphicupdated</image:caption><image:title>mitregraphicupdated</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T065715.064.png</image:loc><image:caption>blogposttext20221006T065715064</image:caption><image:title>blogposttext20221006T065715064</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(29).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews29</image:caption><image:title>CopyofBLOGSOCIALSETNews29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Renaissance.png</image:loc><image:caption>Renaissance</image:caption><image:title>Renaissance</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(34).png</image:loc><image:caption>blogposttext34</image:caption><image:title>blogposttext34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(81).png</image:loc><image:caption>blogposttext81</image:caption><image:title>blogposttext81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-cranford-author.png</image:loc><image:caption>jjcranfordauthor</image:caption><image:title>jjcranfordauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-05-16T094933.342.png</image:loc><image:caption>blogposttext20220516T094933342</image:caption><image:title>blogposttext20220516T094933342</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/press-releases/the-cybereason-intelligence-group-issues-a-report-examining-destructive-cyber-attacks-such-as-notpeyta-sony-and-stuxnet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/white-house-unveils-supply-chain-new-security-initiatives</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Inforisktoday%20logo.png</image:loc><image:caption>Inforisktodaylogo</image:caption><image:title>Inforisktodaylogo</image:title></image:image><lastmod>2021-09-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/badrabbit-attack-appeared-to-be-months-in-planning</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Data%20Breach%20Today%20logo.png</image:loc><image:caption>DataBreachTodaylogo</image:caption><image:title>DataBreachTodaylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/preventing-modern-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T074703.175.png</image:loc><image:caption>blogposttext20220627T074703175</image:caption><image:title>blogposttext20220627T074703175</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(121).png</image:loc><image:caption>blogposttext121</image:caption><image:title>blogposttext121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture%20(2).png</image:loc><image:caption>Capture2</image:caption><image:title>Capture2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RansomwareDecoded-blog.png</image:loc><image:caption>RansomwareDecodedblog</image:caption><image:title>RansomwareDecodedblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.cybereason.com/company/careers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/1200x627_Recruiting%20%20V8.png</image:loc><image:caption>1200x627RecruitingV8</image:caption><image:title>1200x627RecruitingV8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco.png</image:loc><image:caption>cybereasonlogovectorLBco</image:caption><image:title>cybereasonlogovectorLBco</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-respondor-gold-8k--full-wing-transparent.png</image:loc><image:caption>crrespondorgold8kfullwingtransparent</image:caption><image:title>crrespondorgold8kfullwingtransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/careers/cr-careers--perks-magnets.jpg</image:loc><image:caption>crcareersperksmagnets</image:caption><image:title>crcareersperksmagnets</image:title></image:image><lastmod>2025-01-28</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-incident-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/incident-response-services.jpg</image:loc><image:caption>incidentresponseservices</image:caption><image:title>incidentresponseservices</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2025-09-08</lastmod></url><url><loc>https://www.cybereason.com/blog/doj-recovers-2.3m-in-bitcoin-ransom-paid-by-colonial-pipeline</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(17).png</image:loc><image:caption>CybereasonBlogTemplate17</image:caption><image:title>CybereasonBlogTemplate17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(21).png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(15).png</image:loc><image:caption>MaliciousLifeepisode15</image:caption><image:title>MaliciousLifeepisode15</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-xdr-is-named-hottest-new-cybersecurity-product</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-cisos-cross-the-bridge-to-the-cloud</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template%20(2)-1.png</image:loc><image:caption>CISOStoriesTemplate21</image:caption><image:title>CISOStoriesTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jim%20Reavis.png</image:loc><image:caption>JimReavis</image:caption><image:title>JimReavis</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-sis-international-limited-partner-to-protect-joint-customers-in-hong-kong-from-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/blog/sodinokibi/revil-ransomware-gang-hit-acer-with-50m-ransom-demand</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94).png</image:loc><image:caption>blogposttext94</image:caption><image:title>blogposttext94</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(102).png</image:loc><image:caption>blogposttext102</image:caption><image:title>blogposttext102</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SodinokibiREvil.png</image:loc><image:caption>SodinokibiREvil</image:caption><image:title>SodinokibiREvil</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.cybereason.com/blog/announcing-cybereason-on-prem</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/mike-smart-hs.jpg</image:loc><image:caption>mikesmarths</image:caption><image:title>mikesmarths</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee.png</image:loc><image:caption>Employee</image:caption><image:title>Employee</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(105)-1.png</image:loc><image:caption>blogposttext1051</image:caption><image:title>blogposttext1051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-announcement-blog-featured.png</image:loc><image:caption>onpremannouncementblogfeatured</image:caption><image:title>onpremannouncementblogfeatured</image:title></image:image><lastmod>2024-02-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/this-free-new-software-protects-your-pc-against-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CSO.png</image:loc><image:caption>CSO</image:caption><image:title>CSO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-expands-operations-in-benelux-nordics-regions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-detectia--in-flight.webp</image:loc><image:caption>crowldetectiainflight</image:caption><image:title>crowldetectiainflight</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/11controls-bg-web2.jpg</image:loc><image:caption>11controlsbgweb2</image:caption><image:title>11controlsbgweb2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/dev/cr-bg-hp-hero--01.png</image:loc><image:caption>crbghphero01</image:caption><image:title>crbghphero01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-owl-swoop--full-opac.webp</image:loc><image:caption>crbgowlswoopfullopac</image:caption><image:title>crbgowlswoopfullopac</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/extended-attack-surface-protection-icon--white.svg</image:loc><image:caption>extendedattacksurfaceprotectioniconwhite</image:caption><image:title>extendedattacksurfaceprotectioniconwhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/malop-engine-icon--white.png</image:loc><image:caption>malopengineiconwhite</image:caption><image:title>malopengineiconwhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-sand-owl--transparent.png</image:loc><image:caption>crsandowltransparent</image:caption><image:title>crsandowltransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/security-operations-optimization-icon--white.svg</image:loc><image:caption>securityoperationsoptimizationiconwhite</image:caption><image:title>securityoperationsoptimizationiconwhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/endpoint-protection-icon--white.svg</image:loc><image:caption>endpointprotectioniconwhite</image:caption><image:title>endpointprotectioniconwhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/LB-495-LB-Cybereason-Hero-Background-1000x448.png</image:loc><image:caption>LB495LBCybereasonHeroBackground1000x448</image:caption><image:title>LB495LBCybereasonHeroBackground1000x448</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-featured-image.png</image:loc><image:caption>crfeaturedimage</image:caption><image:title>crfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/posture-and-incident-management-icon--white.svg</image:loc><image:caption>postureandincidentmanagementiconwhite</image:caption><image:title>postureandincidentmanagementiconwhite</image:title></image:image><lastmod>2026-01-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/wanna-stay-safe-trash-that-internet-connected-security-camera-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/The-McClatchy-Company-MNI.gif</image:loc><image:caption>TheMcClatchyCompanyMNI</image:caption><image:title>TheMcClatchyCompanyMNI</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-moonlight-maze</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-232-Card.png</image:loc><image:caption>MLEp232Card</image:caption><image:title>MLEp232Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(9).png</image:loc><image:caption>MaliciousLifeepisode9</image:caption><image:title>MaliciousLifeepisode9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/attackers-use-tax-season-to-spread-malware-launch-phishing-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(23).png</image:loc><image:caption>CybereasonBlogTemplate23</image:caption><image:title>CybereasonBlogTemplate23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_577577386.jpg</image:loc><image:caption>shutterstock577577386</image:caption><image:title>shutterstock577577386</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/defend-forward-taking-the-fight-to-the-adversary</loc><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(42).png</image:loc><image:caption>blogposttext42</image:caption><image:title>blogposttext42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-03-14</lastmod></url><url><loc>https://www.cybereason.com/blog/assessing-ngav-solutions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(28).png</image:loc><image:caption>CybereasonBlogTemplate28</image:caption><image:title>CybereasonBlogTemplate28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-11-10</lastmod></url><url><loc>https://www.cybereason.com/resources/webinar-2022-mitre-attck-evaluation-explained</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/mitre-r4-webinar-featured.png</image:loc><image:caption>mitrer4webinarfeatured</image:caption><image:title>mitrer4webinarfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-04-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hacker-honeypot-shows-even-amateurs-are-going-after-ics-systems</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cyberscoop%20logo.png</image:loc><image:caption>cyberscooplogo</image:caption><image:title>cyberscooplogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-08-16</lastmod></url><url><loc>https://www.cybereason.com/blog/behind-closed-doors-the-rise-of-hidden-malicious-remote-access</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-2.png</image:loc><image:caption>hVNCblog2</image:caption><image:title>hVNCblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-4.png</image:loc><image:caption>hVNCblog4</image:caption><image:title>hVNCblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-33.png</image:loc><image:caption>hVNCblog33</image:caption><image:title>hVNCblog33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-31.png</image:loc><image:caption>hVNCblog31</image:caption><image:title>hVNCblog31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/mark-tsipershtein-hs.png</image:loc><image:caption>marktsipershteinhs</image:caption><image:title>marktsipershteinhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-18.png</image:loc><image:caption>hVNCblog18</image:caption><image:title>hVNCblog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-10.png</image:loc><image:caption>hVNCblog10</image:caption><image:title>hVNCblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/hardbit-threat-analysis-featured.png</image:loc><image:caption>hardbitthreatanalysisfeatured</image:caption><image:title>hardbitthreatanalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-35.png</image:loc><image:caption>hVNCblog35</image:caption><image:title>hVNCblog35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-15.png</image:loc><image:caption>hVNCblog15</image:caption><image:title>hVNCblog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/behind-closed-doors-rise-of-remote-access-featured.png</image:loc><image:caption>behindcloseddoorsriseofremoteaccessfeatured</image:caption><image:title>behindcloseddoorsriseofremoteaccessfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-8.png</image:loc><image:caption>hVNCblog8</image:caption><image:title>hVNCblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/snake-python-infostealer-blog-featured.png</image:loc><image:caption>snakepythoninfostealerblogfeatured</image:caption><image:title>snakepythoninfostealerblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-34.png</image:loc><image:caption>hVNCblog34</image:caption><image:title>hVNCblog34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-28.png</image:loc><image:caption>hVNCblog28</image:caption><image:title>hVNCblog28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-3.png</image:loc><image:caption>hVNCblog3</image:caption><image:title>hVNCblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-32.png</image:loc><image:caption>hVNCblog32</image:caption><image:title>hVNCblog32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-5.png</image:loc><image:caption>hVNCblog5</image:caption><image:title>hVNCblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-22.png</image:loc><image:caption>hVNCblog22</image:caption><image:title>hVNCblog22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-27.png</image:loc><image:caption>hVNCblog27</image:caption><image:title>hVNCblog27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-13.png</image:loc><image:caption>hVNCblog13</image:caption><image:title>hVNCblog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-25.png</image:loc><image:caption>hVNCblog25</image:caption><image:title>hVNCblog25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-1.png</image:loc><image:caption>hVNCblog1</image:caption><image:title>hVNCblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-29.png</image:loc><image:caption>hVNCblog29</image:caption><image:title>hVNCblog29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-14.png</image:loc><image:caption>hVNCblog14</image:caption><image:title>hVNCblog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Enterprise%20Bundles/full-banner-bg-mobile.webp</image:loc><image:caption>fullbannerbgmobile</image:caption><image:title>fullbannerbgmobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-21.png</image:loc><image:caption>hVNCblog21</image:caption><image:title>hVNCblog21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-24.png</image:loc><image:caption>hVNCblog24</image:caption><image:title>hVNCblog24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-9.png</image:loc><image:caption>hVNCblog9</image:caption><image:title>hVNCblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-7.png</image:loc><image:caption>hVNCblog7</image:caption><image:title>hVNCblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-6.png</image:loc><image:caption>hVNCblog6</image:caption><image:title>hVNCblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hVNC-blog-12.png</image:loc><image:caption>hVNCblog12</image:caption><image:title>hVNCblog12</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-russia-and-others-use-cybercriminals-as-proxies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Yahoo-Tech1.png</image:loc><image:caption>YahooTech1</image:caption><image:title>YahooTech1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/case-study-a-large-financial-services-company-discovers-the-shortcomings-of-iocs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_382756177.jpg</image:loc><image:caption>shutterstock382756177</image:caption><image:title>shutterstock382756177</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/press/-rss-email-newsletters-put-prweb-on-your-site-cybereason-announces-deep-2017-event</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/superdrug-admits-disclosure-of-personal-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Silicon.co.jpg</image:loc><image:caption>Siliconco</image:caption><image:title>Siliconco</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-08-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-ten-years-on-are-we-doing-security-right</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malcolm%20Harkins.png</image:loc><image:caption>MalcolmHarkins</image:caption><image:title>MalcolmHarkins</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/124%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>124MALICIOUSLIFE</image:caption><image:title>124MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Art%20Coviello.png</image:loc><image:caption>ArtCoviello</image:caption><image:title>ArtCoviello</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/138%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>138MALICIOUSLIFE</image:caption><image:title>138MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2021-12-08</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcst-maintaining-secure-business-continuity-with-a-remote-workforce-with-sam-curry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(25).png</image:loc><image:caption>MaliciousLifeepisode25</image:caption><image:title>MaliciousLifeepisode25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(29).png</image:loc><image:caption>MaliciousLifeepisode29</image:caption><image:title>MaliciousLifeepisode29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/78%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>78MALICIOUSLIFE</image:caption><image:title>78MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-huawei-ban-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/75%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>75MALICIOUSLIFE</image:caption><image:title>75MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gI_67392_Amit%20Serper%20Photo%202016.png</image:loc><image:caption>gI67392AmitSerperPhoto2016</image:caption><image:title>gI67392AmitSerperPhoto2016</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/trickbot-gang-is-now-a-malware-supplier-for-north-korean-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zdnet-3.png</image:loc><image:caption>zdnet3</image:caption><image:title>zdnet3</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs-solarwinds-supply-chain-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20vs.%20SolarWinds%20Attack.png</image:loc><image:caption>CybereasonvsSolarWindsAttack</image:caption><image:title>CybereasonvsSolarWindsAttack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(20).png</image:loc><image:caption>MaliciousLifeepisode20</image:caption><image:title>MaliciousLifeepisode20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ripple-price-news-what-is-the-price-of-ripple-is-xrp-falling</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Daily%20Express%20Logo.png</image:loc><image:caption>DailyExpressLogo</image:caption><image:title>DailyExpressLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-07-24</lastmod></url><url><loc>https://www.cybereason.com/blog/placing-blame-is-a-media-game-why-attribution-is-a-challenge-in-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(8)-1.png</image:loc><image:caption>CybereasonBlogTemplate81</image:caption><image:title>CybereasonBlogTemplate81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/blame_game_banner.png</image:loc><image:caption>blamegamebanner</image:caption><image:title>blamegamebanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(20)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews201</image:caption><image:title>CopyofBLOGSOCIALSETNews201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-01-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/voting-in-the-time-of-coronavirus-gloves-rumors-and-disinfectant</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20News-4.png</image:loc><image:caption>YahooNews4</image:caption><image:title>YahooNews4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/blog/detecting-cyber-events-is-key-to-u.k.-cybersecurity-strategy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(91).png</image:loc><image:caption>blogposttext91</image:caption><image:title>blogposttext91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8994.jpg</image:loc><image:caption>IMG8994</image:caption><image:title>IMG8994</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(64).png</image:loc><image:caption>blogposttext64</image:caption><image:title>blogposttext64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(74).png</image:loc><image:caption>blogposttext74</image:caption><image:title>blogposttext74</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-04-11</lastmod></url><url><loc>https://www.cybereason.com/resources/revil-pick-your-path-interactive-webinar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/revil-pick-your-path-on-demand.png</image:loc><image:caption>revilpickyourpathondemand</image:caption><image:title>revilpickyourpathondemand</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/telecom-service-provider-attacks-7-corporate-espionage-takeaways</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mssp-alert-logo.png</image:loc><image:caption>msspalertlogo</image:caption><image:title>msspalertlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2019-06-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-mdr-mobile-app-puts-power-of-soc-at-defenders-fingertips</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Post%20MEA-1.png</image:loc><image:caption>ChannelPostMEA1</image:caption><image:title>ChannelPostMEA1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-08-23</lastmod></url><url><loc>https://www.cybereason.com/blog/fileless-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Blog_Post-Header_Malware-1.png</image:loc><image:caption>BlogPostHeaderMalware1</image:caption><image:title>BlogPostHeaderMalware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(88).png</image:loc><image:caption>blogposttext88</image:caption><image:title>blogposttext88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2023-04-04</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-morris-worm-pt.-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Gene%20Spafford.jpeg</image:loc><image:caption>GeneSpafford</image:caption><image:title>GeneSpafford</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/how-countries-can-lose-the-internet-ep-213.png</image:loc><image:caption>howcountriescanlosetheinternetep213</image:caption><image:title>howcountriescanlosetheinternetep213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/25%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>25MALICIOUSLIFE1</image:caption><image:title>25MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/spark-capital-leads-25m-round-for-cybersecurity-startup-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/third-party-momentum-validation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/it-cs-case-study-cover.png</image:loc><image:caption>itcscasestudycover</image:caption><image:title>itcscasestudycover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/dev/review.png</image:loc><image:caption>review</image:caption><image:title>review</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v4_Page_1.png</image:loc><image:caption>BLOGImagesTemplatev4Page1</image:caption><image:title>BLOGImagesTemplatev4Page1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE%202024%20CYBEREASON.png</image:loc><image:caption>MITRE2024CYBEREASON</image:caption><image:title>MITRE2024CYBEREASON</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202025-01-27%20at%209.43.40%20AM.png</image:loc><image:caption>Screenshot20250127at94340AM</image:caption><image:title>Screenshot20250127at94340AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2025-01-28</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-recognized-in-debut-wave-report-for-extended-detection-and-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-sam-curry-the-2020-crystal-ball</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/64%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>64MALICIOUSLIFE</image:caption><image:title>64MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/darkside-gang-and-the-new-golden-age-of-piracy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template.png</image:loc><image:caption>CybereasonBlogTemplate</image:caption><image:title>CybereasonBlogTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(23).png</image:loc><image:caption>CybereasonBlogTemplate23</image:caption><image:title>CybereasonBlogTemplate23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/maggie-macalpine.png</image:loc><image:caption>maggiemacalpine</image:caption><image:title>maggiemacalpine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-05-17</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alert-covid-19</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/YELLOW_THREAT_ALERT_CR_ICONS-53.svg</image:loc><image:caption>YELLOWTHREATALERTCRICONS53</image:caption><image:title>YELLOWTHREATALERTCRICONS53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/nokia-subsidiary-reveals-data-breach-following-conti-ransomware-raid</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITPro%20logo-2.png</image:loc><image:caption>ITPrologo2</image:caption><image:title>ITPrologo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-08-27</lastmod></url><url><loc>https://www.cybereason.com/blog/industrial-control-system-specialized-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_234023125.jpg</image:loc><image:caption>shutterstock234023125</image:caption><image:title>shutterstock234023125</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CybereasonLogo_300x300%20(1).jpg</image:loc><image:caption>CybereasonLogo300x3001</image:caption><image:title>CybereasonLogo300x3001</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(7).png</image:loc><image:caption>CybereasonBlogTemplate7</image:caption><image:title>CybereasonBlogTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2018_08_honeypot_attack_graphic_2.jpg</image:loc><image:caption>201808honeypotattackgraphic2</image:caption><image:title>201808honeypotattackgraphic2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><lastmod>2019-06-27</lastmod></url><url><loc>https://www.cybereason.com/blog/three-reasons-big-companies-should-work-with-security-startups</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-continues-its-european-expansion-by-announcing-new-customer-frankfurter-volksbank</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-01-04</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-executive-breach-simulation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/breach-simulation-datasheet-cover.png</image:loc><image:caption>breachsimulationdatasheetcover</image:caption><image:title>breachsimulationdatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-10-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-criminals-target-uae-hospitals-and-people-working-from-home</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20National%20logo%20(UAE).png</image:loc><image:caption>TheNationallogoUAE</image:caption><image:title>TheNationallogoUAE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-05-29</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-how-to-russia-proof-your-democracy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(28).png</image:loc><image:caption>MaliciousLifeepisode28</image:caption><image:title>MaliciousLifeepisode28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Joseph_Carson.png</image:loc><image:caption>JosephCarson</image:caption><image:title>JosephCarson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(20).png</image:loc><image:caption>MaliciousLifeepisode20</image:caption><image:title>MaliciousLifeepisode20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7)-1.png</image:loc><image:caption>MaliciousLifeepisode71</image:caption><image:title>MaliciousLifeepisode71</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-recognized-in-debut-xdr-new-wave-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(113).png</image:loc><image:caption>blogposttext113</image:caption><image:title>blogposttext113</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(9).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews9</image:caption><image:title>CopyofBLOGSOCIALSETNews9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-4.png</image:loc><image:caption>image14</image:caption><image:title>image14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eric-sun-hs.jpg</image:loc><image:caption>ericsunhs</image:caption><image:title>ericsunhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Oct-11-2021-03-57-50-13-PM.png</image:loc><image:caption>image2Oct11202103575013PM</image:caption><image:title>image2Oct11202103575013PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-03-11</lastmod></url><url><loc>https://www.cybereason.com/blog/on-defending-clients-and-promoting-growth</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog_BestinBoston.png</image:loc><image:caption>BlogBestinBoston</image:caption><image:title>BlogBestinBoston</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20tim%20weiss.png</image:loc><image:caption>EmployeeSpotlighttimweiss</image:caption><image:title>EmployeeSpotlighttimweiss</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20Sibel%20Narin-Farooq.png</image:loc><image:caption>EmployeeSpotlightSibelNarinFarooq</image:caption><image:title>EmployeeSpotlightSibelNarinFarooq</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Jan-11-2022-05-43-08-35-PM.png</image:loc><image:caption>CaptureJan11202205430835PM</image:caption><image:title>CaptureJan11202205430835PM</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/blog/how-cybereason-mdr-improved-olists-triage-response-time</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20MDR%20fast%20efficient%20effective.png</image:loc><image:caption>cybereasonMDRfastefficienteffective</image:caption><image:title>cybereasonMDRfastefficienteffective</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/olist-cybereason-mdr.png</image:loc><image:caption>olistcybereasonmdr</image:caption><image:title>olistcybereasonmdr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T125306.964.png</image:loc><image:caption>blogposttext20221003T125306964</image:caption><image:title>blogposttext20221003T125306964</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-12-13</lastmod></url><url><loc>https://www.cybereason.com/blog/how-cybereason-enables-the-uk-to-defend-against-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8994.jpg</image:loc><image:caption>IMG8994</image:caption><image:title>IMG8994</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94)-1.png</image:loc><image:caption>blogposttext941</image:caption><image:title>blogposttext941</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(64).png</image:loc><image:caption>blogposttext64</image:caption><image:title>blogposttext64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(91).png</image:loc><image:caption>blogposttext91</image:caption><image:title>blogposttext91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/press/-rss-email-newsletters-put-prweb-on-your-site-cybereason-named-a-top-disruptive-innovator-by-juniper-research</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-28</lastmod></url><url><loc>https://www.cybereason.com/blog/product/seven-ways-cybereason-enhances-your-cyber-insurance-investment</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRXDR.png</image:loc><image:caption>CRXDR</image:caption><image:title>CRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(83).png</image:loc><image:caption>blogposttext83</image:caption><image:title>blogposttext83</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zerotrust.png</image:loc><image:caption>zerotrust</image:caption><image:title>zerotrust</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-04-22</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-redefines-next-generation-antivirus-by-delivering-nation-state-level-protection-for-organizations-of-all-sizes</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-amit-serper-interview-holiday-special-episode</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/16%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>16MALICIOUSLIFE1</image:caption><image:title>16MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-225-Card.png</image:loc><image:caption>MLEp225Card</image:caption><image:title>MLEp225Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/generative-ai-dangerous-ep-222.png</image:loc><image:caption>generativeaidangerousep222</image:caption><image:title>generativeaidangerousep222</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomops-attacks-yield-record-returns-for-perpetrators</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Beta%20News%20logo-May-09-2022-03-30-43-48-PM.png</image:loc><image:caption>BetaNewslogoMay09202203304348PM</image:caption><image:title>BetaNewslogoMay09202203304348PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/blog/new-cluster-andromeda-gamrue-c2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/masquerading%20googlechrome%20proram%20allowed.png</image:loc><image:caption>masqueradinggooglechromeproramallowed</image:caption><image:title>masqueradinggooglechromeproramallowed</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/multiple%20other%20lnk%20files%20pointing%20to%20trojan%20on%20execution.png</image:loc><image:caption>multipleotherlnkfilespointingtotrojanonexecution</image:caption><image:title>multipleotherlnkfilespointingtotrojanonexecution</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/process%20tree%20for%20another%20attack.png</image:loc><image:caption>processtreeforanotherattack</image:caption><image:title>processtreeforanotherattack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/full%20process%20tree%20during%20attack.png</image:loc><image:caption>fullprocesstreeduringattack</image:caption><image:title>fullprocesstreeduringattack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/malicious%20file%20in%20victim%20environment.png</image:loc><image:caption>maliciousfileinvictimenvironment</image:caption><image:title>maliciousfileinvictimenvironment</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/details%20of%20masquerading%20googlechrome%20binary.png</image:loc><image:caption>detailsofmasqueradinggooglechromebinary</image:caption><image:title>detailsofmasqueradinggooglechromebinary</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/dropped%20file%20loading%20the%20malware.png</image:loc><image:caption>droppedfileloadingthemalware</image:caption><image:title>droppedfileloadingthemalware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/graphical%20flow%20of%20attack%20chain.png</image:loc><image:caption>graphicalflowofattackchain</image:caption><image:title>graphicalflowofattackchain</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/malware%20with%20all%20possible%20names%20to%20evade%20detection.png</image:loc><image:caption>malwarewithallpossiblenamestoevadedetection</image:caption><image:title>malwarewithallpossiblenamestoevadedetection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/execution%20of%20several%20other%20malicious%20lnks.png</image:loc><image:caption>executionofseveralothermaliciouslnks</image:caption><image:title>executionofseveralothermaliciouslnks</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/execution%20process%20tree%20of%20trustedinstaller.png</image:loc><image:caption>executionprocesstreeoftrustedinstaller</image:caption><image:title>executionprocesstreeoftrustedinstaller</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/dll%20file%20making%20c2%20communication.png</image:loc><image:caption>dllfilemakingc2communication</image:caption><image:title>dllfilemakingc2communication</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/execution%20of%20malicious%20dll%20by%20clicking%20known%20lnk%20file.png</image:loc><image:caption>executionofmaliciousdllbyclickingknownlnkfile</image:caption><image:title>executionofmaliciousdllbyclickingknownlnkfile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/certificate%20of%20c2%20domain.png</image:loc><image:caption>certificateofc2domain</image:caption><image:title>certificateofc2domain</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/evidence%20of%20trustedinstaller.png</image:loc><image:caption>evidenceoftrustedinstaller</image:caption><image:title>evidenceoftrustedinstaller</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/details%20of%20the%20c2%20domain.png</image:loc><image:caption>detailsofthec2domain</image:caption><image:title>detailsofthec2domain</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/similar%20process%20tree%20during%20attack.png</image:loc><image:caption>similarprocesstreeduringattack</image:caption><image:title>similarprocesstreeduringattack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/persistence%20achieved%20by%20setting%20the%20registry%20key%20in%20different%20name.png</image:loc><image:caption>persistenceachievedbysettingtheregistrykeyindifferentname</image:caption><image:title>persistenceachievedbysettingtheregistrykeyindifferentname</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/desktop%20retrieved%20using%20expoitation%20of%20daysetcookie.png</image:loc><image:caption>desktopretrievedusingexpoitationofdaysetcookie</image:caption><image:title>desktopretrievedusingexpoitationofdaysetcookie</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/common%20ip%20addresses%20use%20for%20andromeda%20backdoor.png</image:loc><image:caption>commonipaddressesuseforandromedabackdoor</image:caption><image:title>commonipaddressesuseforandromedabackdoor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/modules%20contained%20by%20trustedinstaller.png</image:loc><image:caption>modulescontainedbytrustedinstaller</image:caption><image:title>modulescontainedbytrustedinstaller</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/gamrue%20injects%20itself%20into%20sychost.png</image:loc><image:caption>gamrueinjectsitselfintosychost</image:caption><image:title>gamrueinjectsitselfintosychost</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/malicious%20binary%20connecting%20to%20c2%20domain.png</image:loc><image:caption>maliciousbinaryconnectingtoc2domain</image:caption><image:title>maliciousbinaryconnectingtoc2domain</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Stellar-Discovery_v2.png</image:loc><image:caption>BLOGStellarDiscoveryv2</image:caption><image:title>BLOGStellarDiscoveryv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xy-backdoor-blog-featured.png</image:loc><image:caption>xybackdoorblogfeatured</image:caption><image:title>xybackdoorblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Andromeda/gamrueandromeda%20malware.png</image:loc><image:caption>gamrueandromedamalware</image:caption><image:title>gamrueandromedamalware</image:title></image:image><lastmod>2024-12-03</lastmod></url><url><loc>https://www.cybereason.com/resources/wr-2020-03-covid-19-outside-the-perimeter</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/covid-19-hero-globe.png</image:loc><image:caption>covid19heroglobe</image:caption><image:title>covid19heroglobe</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2020-06-03</lastmod></url><url><loc>https://www.cybereason.com/blog/understanding-the-mitre-attck-apt29-round-2-evaluation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Attack-Blog-Round-2A.png</image:loc><image:caption>MITREAttackBlogRound2A</image:caption><image:title>MITREAttackBlogRound2A</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-2020-Blog-1.png</image:loc><image:caption>MITRE2020Blog1</image:caption><image:title>MITRE2020Blog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-2020-Blog-2.png</image:loc><image:caption>MITRE2020Blog2</image:caption><image:title>MITRE2020Blog2</image:title></image:image><lastmod>2021-04-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fake-amazon-gift-card-emails-deliver-the-dridex-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bleeping%20Computer%20logo.png</image:loc><image:caption>BleepingComputerlogo</image:caption><image:title>BleepingComputerlogo</image:title></image:image><lastmod>2021-01-04</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-launches-a-new-podcast-malicious-life</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/bought-a-car-recently-198-million-car-buyer-records-exposed-in-massive-data-leak</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes-1.jpg</image:loc><image:caption>Forbes1</image:caption><image:title>Forbes1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2019-10-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereasons-chief-security-officer-sam-curry-discusses-latest-cybersecurity-trends</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Wash%20Post%20Logo.png</image:loc><image:caption>WashPostLogo</image:caption><image:title>WashPostLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/that-missed-delivery-notice-may-be-a-holiday-scam</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CBS-News.png</image:loc><image:caption>CBSNews</image:caption><image:title>CBSNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-announces-record-growth-in-2017-and-rapid-international-expansion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-02-14</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-celebrates-ransomfrees-first-birthday</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/resources/ttp-briefing-jan-may-2025</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2025-09-24</lastmod></url><url><loc>https://www.cybereason.com/services/mdr-essentials-bundle</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-mdr-essentials-thumbnail.jpg</image:loc><image:caption>crmdressentialsthumbnail</image:caption><image:title>crmdressentialsthumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-dkgray-03.png</image:loc><image:caption>crbgsubtledkgray03</image:caption><image:title>crbgsubtledkgray03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR2_CR_ICONS-11.png</image:loc><image:caption>EDR2CRICONS11</image:caption><image:title>EDR2CRICONS11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/chart-icon-check.svg</image:loc><image:caption>charticoncheck</image:caption><image:title>charticoncheck</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-ltgray-03.png</image:loc><image:caption>crbgsubtleltgray03</image:caption><image:title>crbgsubtleltgray03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/chart-icon-dash.svg</image:loc><image:caption>charticondash</image:caption><image:title>charticondash</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/REPORT_CR_ICONS-41.svg</image:loc><image:caption>REPORTCRICONS41</image:caption><image:title>REPORTCRICONS41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/DEPLOY_CR_ICONS-07.png</image:loc><image:caption>DEPLOYCRICONS07</image:caption><image:title>DEPLOYCRICONS07</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-07-08</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-debuts-the-defenders-a-new-film-that-shines-light-on-the-incredible-people-that-protect-organizations-from-global-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-05-08</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-doomed-queens-secret-ciphers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Geroge-Lasry.jpeg</image:loc><image:caption>GerogeLasry</image:caption><image:title>GerogeLasry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-246-Card.png</image:loc><image:caption>MLEp246Card</image:caption><image:title>MLEp246Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-247-Card.png</image:loc><image:caption>MLEp247Card</image:caption><image:title>MLEp247Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-248-Card.png</image:loc><image:caption>MLEp248Card</image:caption><image:title>MLEp248Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><lastmod>2024-07-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/emmy-linder-of-cybereason-always-smile-its-advice-nobody-likes-to-hear-but-i-think-everybody-needs-to-smile-more-often</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Authority%20Magazine%20logo.png</image:loc><image:caption>AuthorityMagazinelogo</image:caption><image:title>AuthorityMagazinelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-06-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-targeted-telecom-networks-to-spy-on-high-profile-people</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CBS_News_logo.png</image:loc><image:caption>CBSNewslogo</image:caption><image:title>CBSNewslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/organizations-battling-phishing-malware-viruses-the-most</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-Jul-20-2022-02-41-06-97-AM.png</image:loc><image:caption>DarkReadinglogoJul20202202410697AM</image:caption><image:title>DarkReadinglogoJul20202202410697AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/blog/how-does-xdr-solve-the-it-infrastructure-visibility-gap</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(9).png</image:loc><image:caption>blogposttext9</image:caption><image:title>blogposttext9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(28).png</image:loc><image:caption>blogposttext28</image:caption><image:title>blogposttext28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(46).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews46</image:caption><image:title>CopyofBLOGSOCIALSETNews46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/boards-should-take-responsibility-for-cybersecurity-heres-how-to-do-it</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/HBR%20logo.png</image:loc><image:caption>HBRlogo</image:caption><image:title>HBRlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs-darkside-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image%2012.png</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vs-ransomware.png</image:loc><image:caption>vsransomware</image:caption><image:title>vsransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%207.png</image:loc><image:caption>image7</image:caption><image:title>image7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%205.png</image:loc><image:caption>image5</image:caption><image:title>image5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%201.png</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-1.png</image:loc><image:caption>image21</image:caption><image:title>image21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%202.png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Lior-R-HS-1.png</image:loc><image:caption>LiorRHS1</image:caption><image:title>LiorRHS1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%208.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%2021%20left.png</image:loc><image:caption>image21left</image:caption><image:title>image21left</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%2017.png</image:loc><image:caption>image17</image:caption><image:title>image17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%209.png</image:loc><image:caption>image9</image:caption><image:title>image9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%203%20left.png</image:loc><image:caption>image3left</image:caption><image:title>image3left</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%2016.png</image:loc><image:caption>image16</image:caption><image:title>image16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%2014.png</image:loc><image:caption>image14</image:caption><image:title>image14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%206.png</image:loc><image:caption>image6</image:caption><image:title>image6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%2011.png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%2010.png</image:loc><image:caption>image10</image:caption><image:title>image10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%2018.png</image:loc><image:caption>image18</image:caption><image:title>image18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%2022%20right.png</image:loc><image:caption>image22right</image:caption><image:title>image22right</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Darkside-blog.png</image:loc><image:caption>Darksideblog</image:caption><image:title>Darksideblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%2019.png</image:loc><image:caption>image19</image:caption><image:title>image19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%2013.png</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%204%20right.png</image:loc><image:caption>image4right</image:caption><image:title>image4right</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%2015.png</image:loc><image:caption>image15</image:caption><image:title>image15</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/dell-admits-hackers-may-have-stolen-customer-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/forbes-logo-4.gif</image:loc><image:caption>forbeslogo4</image:caption><image:title>forbeslogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-12-03</lastmod></url><url><loc>https://www.cybereason.com/blog/the-next-gen-endpoint-advantage-detection-without-the-drawbacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CybereasonBlogHeroTemplate</image:caption><image:title>CybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Blog_Endpoints_Header.png</image:loc><image:caption>BlogEndpointsHeader</image:caption><image:title>BlogEndpointsHeader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(107).png</image:loc><image:caption>blogposttext107</image:caption><image:title>blogposttext107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/these-are-the-tech-leaders-that-want-amazon-in-boston</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Boston-Business-Journal.jpg</image:loc><image:caption>BostonBusinessJournal</image:caption><image:title>BostonBusinessJournal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/mitre-attck-evaluations-showcase-cybereasons-detailed-context-and-visibility</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-mitre-23-lp-featured-1.png</image:loc><image:caption>crmitre23lpfeatured1</image:caption><image:title>crmitre23lpfeatured1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/maranda-hs.jpg</image:loc><image:caption>marandahs</image:caption><image:title>marandahs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(65).png</image:loc><image:caption>blogposttext65</image:caption><image:title>blogposttext65</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Blog-3.png</image:loc><image:caption>MITREBlog3</image:caption><image:title>MITREBlog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Blog-Hero-2.jpg</image:loc><image:caption>MITREBlogHero2</image:caption><image:title>MITREBlogHero2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Blog-1.png</image:loc><image:caption>MITREBlog1</image:caption><image:title>MITREBlog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Blog-2.png</image:loc><image:caption>MITREBlog2</image:caption><image:title>MITREBlog2</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-marcus-hutchins-a-controversial-hero</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(1).png</image:loc><image:caption>MaliciousLifeTemplate1</image:caption><image:title>MaliciousLifeTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(32).png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><lastmod>2021-10-25</lastmod></url><url><loc>https://www.cybereason.com/blog/hardening-of-hardbit</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-20.png</image:loc><image:caption>hardbit4blog20</image:caption><image:title>hardbit4blog20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-19.png</image:loc><image:caption>hardbit4blog19</image:caption><image:title>hardbit4blog19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-15.png</image:loc><image:caption>hardbit4blog15</image:caption><image:title>hardbit4blog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(124).png</image:loc><image:caption>blogposttext124</image:caption><image:title>blogposttext124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-26.png</image:loc><image:caption>hardbit4blog26</image:caption><image:title>hardbit4blog26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-24.png</image:loc><image:caption>hardbit4blog24</image:caption><image:title>hardbit4blog24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-16.png</image:loc><image:caption>hardbit4blog16</image:caption><image:title>hardbit4blog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/hardbit-threat-analysis-featured.png</image:loc><image:caption>hardbitthreatanalysisfeatured</image:caption><image:title>hardbitthreatanalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-10.png</image:loc><image:caption>hardbit4blog10</image:caption><image:title>hardbit4blog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-2.png</image:loc><image:caption>hardbit4blog2</image:caption><image:title>hardbit4blog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-28.png</image:loc><image:caption>hardbit4blog28</image:caption><image:title>hardbit4blog28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-7.png</image:loc><image:caption>hardbit4blog7</image:caption><image:title>hardbit4blog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/beast-ransomware-blog-featured.png</image:loc><image:caption>beastransomwareblogfeatured</image:caption><image:title>beastransomwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-4.png</image:loc><image:caption>hardbit4blog4</image:caption><image:title>hardbit4blog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Kotaro-Ogino.jpg</image:loc><image:caption>KotaroOgino</image:caption><image:title>KotaroOgino</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-12.png</image:loc><image:caption>hardbit4blog12</image:caption><image:title>hardbit4blog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-23.png</image:loc><image:caption>hardbit4blog23</image:caption><image:title>hardbit4blog23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-11.png</image:loc><image:caption>hardbit4blog11</image:caption><image:title>hardbit4blog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/koshi-hs.png</image:loc><image:caption>koshihs</image:caption><image:title>koshihs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-21.png</image:loc><image:caption>hardbit4blog21</image:caption><image:title>hardbit4blog21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-13.png</image:loc><image:caption>hardbit4blog13</image:caption><image:title>hardbit4blog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-14.png</image:loc><image:caption>hardbit4blog14</image:caption><image:title>hardbit4blog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-5.png</image:loc><image:caption>hardbit4blog5</image:caption><image:title>hardbit4blog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-1b.png</image:loc><image:caption>hardbit4blog1b</image:caption><image:title>hardbit4blog1b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-25.png</image:loc><image:caption>hardbit4blog25</image:caption><image:title>hardbit4blog25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-17.png</image:loc><image:caption>hardbit4blog17</image:caption><image:title>hardbit4blog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-6.png</image:loc><image:caption>hardbit4blog6</image:caption><image:title>hardbit4blog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-22.png</image:loc><image:caption>hardbit4blog22</image:caption><image:title>hardbit4blog22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-9.png</image:loc><image:caption>hardbit4blog9</image:caption><image:title>hardbit4blog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-18.png</image:loc><image:caption>hardbit4blog18</image:caption><image:title>hardbit4blog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-27.png</image:loc><image:caption>hardbit4blog27</image:caption><image:title>hardbit4blog27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-8.png</image:loc><image:caption>hardbit4blog8</image:caption><image:title>hardbit4blog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-1a.png</image:loc><image:caption>hardbit4blog1a</image:caption><image:title>hardbit4blog1a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/hardbit4-blog-3.png</image:loc><image:caption>hardbit4blog3</image:caption><image:title>hardbit4blog3</image:title></image:image><lastmod>2024-07-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackney-services-still-offline-in-ongoing-cyber-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-3.png</image:loc><image:caption>ComputerWeeklylogo3</image:caption><image:title>ComputerWeeklylogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-10-28</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-launches-sdr-data-ramp-program-enabling-customers-to-analyze-and-detect-threats-in-up-to-1tb-of-log-data-for-90-days</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ho-ho-ho-ransomware-attacks-aplenty-expected-during-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Futures-4.png</image:loc><image:caption>ChannelFutures4</image:caption><image:title>ChannelFutures4</image:title></image:image><lastmod>2021-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-massive-hacking-campaign-is-targeting-flaws-in-microsofts-email-software</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Business%20Insider%20Logo-Mar-10-2021-12-21-25-50-AM.png</image:loc><image:caption>BusinessInsiderLogoMar10202112212550AM</image:caption><image:title>BusinessInsiderLogoMar10202112212550AM</image:title></image:image><lastmod>2021-03-10</lastmod></url><url><loc>https://www.cybereason.com/blog/phishing-attacks-fake-icons</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image1-11.png</image:loc><image:caption>image111</image:caption><image:title>image111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Deep%20REspond-2.jpg</image:loc><image:caption>DeepREspond2</image:caption><image:title>DeepREspond2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Adobe-Icons-Blog%20copy%20(1).png</image:loc><image:caption>AdobeIconsBlogcopy1</image:caption><image:title>AdobeIconsBlogcopy1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-4.png</image:loc><image:caption>image84</image:caption><image:title>image84</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-7.png</image:loc><image:caption>image37</image:caption><image:title>image37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-2.png</image:loc><image:caption>image102</image:caption><image:title>image102</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-2.png</image:loc><image:caption>image112</image:caption><image:title>image112</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-9.png</image:loc><image:caption>image29</image:caption><image:title>image29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/T03CSH6QK-U4ESR8KN2-194b6f22d2f8-512.jpg</image:loc><image:caption>T03CSH6QKU4ESR8KN2194b6f22d2f8512</image:caption><image:title>T03CSH6QKU4ESR8KN2194b6f22d2f8512</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-4.png</image:loc><image:caption>image54</image:caption><image:title>image54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-2.png</image:loc><image:caption>image132</image:caption><image:title>image132</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2018-02-23</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-sysware-partner-to-protect-indonesian-companies-from-sophisticated-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-09-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-expanding-xdr-offering-with-empow-acquisition</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Futures-2.png</image:loc><image:caption>ChannelFutures2</image:caption><image:title>ChannelFutures2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-07-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-raises-200-million-led-by-softbank-ahead-of-ipo</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/forbes-logo-7.gif</image:loc><image:caption>forbeslogo7</image:caption><image:title>forbeslogo7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2019-08-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/deals-of-the-day-jos.-a.-bank-buying-eddie-bauer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/fortune.jpg</image:loc><image:caption>fortune</image:caption><image:title>fortune</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/press/levelblue-acquires-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Banner-1.png</image:loc><image:caption>Banner1</image:caption><image:title>Banner1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2025-11-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/owners-urged-to-update-apple-devices-quickly-but-stay-calm-over-security-flaw-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Press%20Association%20logo.jpg</image:loc><image:caption>PressAssociationlogo</image:caption><image:title>PressAssociationlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-08-23</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-why-next-generation-antivirus-still-isnt-enough-to-protect-enterprises</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_355734296.jpg</image:loc><image:caption>shutterstock355734296</image:caption><image:title>shutterstock355734296</image:title></image:image><lastmod>2018-04-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinese-cyberattackers-compromising-telcos-in-southeast-asia-for-espionage</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-1.png</image:loc><image:caption>CSOMagazinelogo1</image:caption><image:title>CSOMagazinelogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-08-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-joins-hottest-tech-companies-on-cnbcs-2021-disruptor-50-list</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC%20logo-4.png</image:loc><image:caption>CNBClogo4</image:caption><image:title>CNBClogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-05-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/this-new-android-mobile-malware-targets-banks-financial-services-across-europe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet.jpg</image:loc><image:caption>ZDNet</image:caption><image:title>ZDNet</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-04-30</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-soldiers-of-north-korea</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ido%20naor.png</image:loc><image:caption>idonaor</image:caption><image:title>idonaor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/12%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>12MALICIOUSLIFE1</image:caption><image:title>12MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-launches-secureboston-and-turns-up-the-heat-on-cyber-criminals-and-helps-companies-fight-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/platform/cybereason-enterprise-bundles</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__optional-100px.png</image:loc><image:caption>crchartoptional100px</image:caption><image:title>crchartoptional100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-yellowBG-100px.png</image:loc><image:caption>crchartcheckmarkyellowBG100px</image:caption><image:title>crchartcheckmarkyellowBG100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/xdr-platform-datasheet-cover.png</image:loc><image:caption>xdrplatformdatasheetcover</image:caption><image:title>xdrplatformdatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-edr-datasheet--thumb.jpg</image:loc><image:caption>credrdatasheetthumb</image:caption><image:title>credrdatasheetthumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-100px.png</image:loc><image:caption>crchartcheckmark100px</image:caption><image:title>crchartcheckmark100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-prevention-product-brief%20(1)_Page_1-1.png</image:loc><image:caption>crpreventionproductbrief1Page11</image:caption><image:title>crpreventionproductbrief1Page11</image:title></image:image><lastmod>2025-01-30</lastmod></url><url><loc>https://www.cybereason.com/blog/hackers-vs.-attackers-its-not-always-black-and-white</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(54).png</image:loc><image:caption>blogposttext54</image:caption><image:title>blogposttext54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(2)-1.png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T070701.315.png</image:loc><image:caption>blogposttext20220830T070701315</image:caption><image:title>blogposttext20220830T070701315</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-08-30</lastmod></url><url><loc>https://www.cybereason.com/threat-alert-kimsuky</loc><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/TRAINING_REMEDIATE_DEPLOY_CONNECTIONS_CR_ICONS-15.svg</image:loc><image:caption>TRAININGREMEDIATEDEPLOYCONNECTIONSCRICONS15</image:caption><image:title>TRAININGREMEDIATEDEPLOYCONNECTIONSCRICONS15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PLATFORM3_CR_ICONS-03.svg</image:loc><image:caption>PLATFORM3CRICONS03</image:caption><image:title>PLATFORM3CRICONS03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/REDUCE_FALSE_POSITIVES_CR_ICONS-18.svg</image:loc><image:caption>REDUCEFALSEPOSITIVESCRICONS18</image:caption><image:title>REDUCEFALSEPOSITIVESCRICONS18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/BLOCKED_EXECUTABLE_CR_ICONS-32.svg</image:loc><image:caption>BLOCKEDEXECUTABLECRICONS32</image:caption><image:title>BLOCKEDEXECUTABLECRICONS32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/IMPACTEDGEO_GLOBE2_CR_ICONS-31.svg</image:loc><image:caption>IMPACTEDGEOGLOBE2CRICONS31</image:caption><image:title>IMPACTEDGEOGLOBE2CRICONS31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/247PROTECTION_THREATHUNTING_CR_ICONS-19.svg</image:loc><image:caption>247PROTECTIONTHREATHUNTINGCRICONS19</image:caption><image:title>247PROTECTIONTHREATHUNTINGCRICONS19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines.png</image:loc><image:caption>crbghexagonlines</image:caption><image:title>crbghexagonlines</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/FILELESS_RANSOMWARE_PREVENTION_CLOUD_CR_ICONS-05.svg</image:loc><image:caption>FILELESSRANSOMWAREPREVENTIONCLOUDCRICONS05</image:caption><image:title>FILELESSRANSOMWAREPREVENTIONCLOUDCRICONS05</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-cyberthreats-can-middle-east-expect-in-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Trends%20Mena%20logo-1.png</image:loc><image:caption>TrendsMenalogo1</image:caption><image:title>TrendsMenalogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/services/cyber-posture-assessment</loc><image:image><image:loc>https://www.cybereason.com/hubfs/owls%20.png</image:loc><image:caption>owls</image:caption><image:title>owls</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-icon--black.svg</image:loc><image:caption>crlogoiconblack</image:caption><image:title>crlogoiconblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/Posture_Datasheet_Thumbnail-min.png</image:loc><image:caption>PostureDatasheetThumbnailmin</image:caption><image:title>PostureDatasheetThumbnailmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/MAGNIFY_CR_ICONS-45.svg</image:loc><image:caption>MAGNIFYCRICONS45</image:caption><image:title>MAGNIFYCRICONS45</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/TECH_DEEPDIVE_KNOWLEDGE_CR_ICONS-27.svg</image:loc><image:caption>TECHDEEPDIVEKNOWLEDGECRICONS27</image:caption><image:title>TECHDEEPDIVEKNOWLEDGECRICONS27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/IR_ProfService_Brief_v1_Thumbnail.png</image:loc><image:caption>IRProfServiceBriefv1Thumbnail</image:caption><image:title>IRProfServiceBriefv1Thumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/iconsand.png</image:loc><image:caption>iconsand</image:caption><image:title>iconsand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PROACTIVE_THREATHUNTING_CR_ICONS-25.svg</image:loc><image:caption>PROACTIVETHREATHUNTINGCRICONS25</image:caption><image:title>PROACTIVETHREATHUNTINGCRICONS25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--platform-01-gradient.jpg</image:loc><image:caption>crbgheroplatform01gradient</image:caption><image:title>crbgheroplatform01gradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/OPTIMIZE_SECURITY_OPS_CR_ICONS-20.svg</image:loc><image:caption>OPTIMIZESECURITYOPSCRICONS20</image:caption><image:title>OPTIMIZESECURITYOPSCRICONS20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/russias-politically-motivated-revil-raid-could-be-used-as-leverage-experts-warn</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITPro%20logo-4.png</image:loc><image:caption>ITPrologo4</image:caption><image:title>ITPrologo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-attacks-remain-persistent-and-pervasive</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(14).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews14</image:caption><image:title>CopyofBLOGSOCIALSETNews14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(85).png</image:loc><image:caption>blogposttext85</image:caption><image:title>blogposttext85</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Ransomware-Persistent-Blog-Card.png</image:loc><image:caption>RansomwarePersistentBlogCard</image:caption><image:title>RansomwarePersistentBlogCard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/dan-raywood-hs.jpg</image:loc><image:caption>danraywoodhs</image:caption><image:title>danraywoodhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-future-of-work-wfh-changing-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Boulevard%20logo.png</image:loc><image:caption>SecurityBoulevardlogo</image:caption><image:title>SecurityBoulevardlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-08-06</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-researchers-discover-a-triple-threat-attack-utilizing-emotet-to-deploy-trickbot-which-steals-data-and-spreads-ryuk-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-04-03</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-solutions-are-not-impacted-by-apache-log4j-vulnerability-cve-2021-44228</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(26)-2.png</image:loc><image:caption>CybereasonBlogTemplate262</image:caption><image:title>CybereasonBlogTemplate262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(3).png</image:loc><image:caption>MaliciousLifeTemplate3</image:caption><image:title>MaliciousLifeTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-04-12</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-is-named-finalist-for-best-endpoint-security-product-in-2020-sc-awards-europe-competition</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-07-01</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-keeping-your-company-safe-means-not-fighting-the-entire-internet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_624047552.jpg</image:loc><image:caption>shutterstock624047552</image:caption><image:title>shutterstock624047552</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/webinar.png</image:loc><image:caption>webinar</image:caption><image:title>webinar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-announces-a/nz-partnership-with-nextgen-distribution</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/channellife.jpg</image:loc><image:caption>channellife</image:caption><image:title>channellife</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/resources/white-papers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Satellite_City_1920x1080-2.jpg</image:loc><image:caption>SatelliteCity1920x10802</image:caption><image:title>SatelliteCity1920x10802</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mobile-cracked-hero-1.jpg</image:loc><image:caption>mobilecrackedhero1</image:caption><image:title>mobilecrackedhero1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Remote_Workforce_Whitepaper_Header_2000x574.jpg</image:loc><image:caption>RemoteWorkforceWhitepaperHeader2000x574</image:caption><image:title>RemoteWorkforceWhitepaperHeader2000x574</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/controls-cover-web.jpg</image:loc><image:caption>controlscoverweb</image:caption><image:title>controlscoverweb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/City%20Top%20View_v2.png</image:loc><image:caption>CityTopViewv2</image:caption><image:title>CityTopViewv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RansomOps.png</image:loc><image:caption>RansomOps</image:caption><image:title>RansomOps</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Insights/Whitepapers/Ebook_Seven-Signs_Thumb-NOshadow.png</image:loc><image:caption>EbookSevenSignsThumbNOshadow</image:caption><image:title>EbookSevenSignsThumbNOshadow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WP_Overcoming_Alert_Fatigue_with_Cybereason_final_Page_01.png</image:loc><image:caption>WPOvercomingAlertFatiguewithCybereasonfinalPage01</image:caption><image:title>WPOvercomingAlertFatiguewithCybereasonfinalPage01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ball_2.jpg</image:loc><image:caption>Ball2</image:caption><image:title>Ball2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mobile-endpoints-hero-1.png</image:loc><image:caption>mobileendpointshero1</image:caption><image:title>mobileendpointshero1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-955010382.jpg</image:loc><image:caption>GettyImages955010382</image:caption><image:title>GettyImages955010382</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware-decoded-cover-1.png</image:loc><image:caption>ransomwaredecodedcover1</image:caption><image:title>ransomwaredecodedcover1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-01-12</lastmod></url><url><loc>https://www.cybereason.com/blog/research/no-rest-for-the-wicked-evilnum-unleashes-pyvil-rat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum33.png</image:loc><image:caption>Evilnum33</image:caption><image:title>Evilnum33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum5.png</image:loc><image:caption>Evilnum5</image:caption><image:title>Evilnum5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum10.png</image:loc><image:caption>Evilnum10</image:caption><image:title>Evilnum10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum17.png</image:loc><image:caption>Evilnum17</image:caption><image:title>Evilnum17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum27.png</image:loc><image:caption>Evilnum27</image:caption><image:title>Evilnum27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum18.png</image:loc><image:caption>Evilnum18</image:caption><image:title>Evilnum18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum3.png</image:loc><image:caption>Evilnum3</image:caption><image:title>Evilnum3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum29.png</image:loc><image:caption>Evilnum29</image:caption><image:title>Evilnum29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum6.png</image:loc><image:caption>Evilnum6</image:caption><image:title>Evilnum6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum32.png</image:loc><image:caption>Evilnum32</image:caption><image:title>Evilnum32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum30.png</image:loc><image:caption>Evilnum30</image:caption><image:title>Evilnum30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum28.png</image:loc><image:caption>Evilnum28</image:caption><image:title>Evilnum28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum24.png</image:loc><image:caption>Evilnum24</image:caption><image:title>Evilnum24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum7.png</image:loc><image:caption>Evilnum7</image:caption><image:title>Evilnum7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum4.png</image:loc><image:caption>Evilnum4</image:caption><image:title>Evilnum4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum1a.png</image:loc><image:caption>Evilnum1a</image:caption><image:title>Evilnum1a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum31.png</image:loc><image:caption>Evilnum31</image:caption><image:title>Evilnum31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum13.png</image:loc><image:caption>Evilnum13</image:caption><image:title>Evilnum13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum19.png</image:loc><image:caption>Evilnum19</image:caption><image:title>Evilnum19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum19b.png</image:loc><image:caption>Evilnum19b</image:caption><image:title>Evilnum19b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum25.png</image:loc><image:caption>Evilnum25</image:caption><image:title>Evilnum25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum26.png</image:loc><image:caption>Evilnum26</image:caption><image:title>Evilnum26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum23.png</image:loc><image:caption>Evilnum23</image:caption><image:title>Evilnum23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum16.png</image:loc><image:caption>Evilnum16</image:caption><image:title>Evilnum16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum15.png</image:loc><image:caption>Evilnum15</image:caption><image:title>Evilnum15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/tom-fakterman.jpg</image:loc><image:caption>tomfakterman</image:caption><image:title>tomfakterman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum8.png</image:loc><image:caption>Evilnum8</image:caption><image:title>Evilnum8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum20.png</image:loc><image:caption>Evilnum20</image:caption><image:title>Evilnum20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum9.png</image:loc><image:caption>Evilnum9</image:caption><image:title>Evilnum9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum12.png</image:loc><image:caption>Evilnum12</image:caption><image:title>Evilnum12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum22.png</image:loc><image:caption>Evilnum22</image:caption><image:title>Evilnum22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum2.png</image:loc><image:caption>Evilnum2</image:caption><image:title>Evilnum2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum14.png</image:loc><image:caption>Evilnum14</image:caption><image:title>Evilnum14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum11.png</image:loc><image:caption>Evilnum11</image:caption><image:title>Evilnum11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fintech-Hack-Evilnum-2.jpg</image:loc><image:caption>FintechHackEvilnum2</image:caption><image:title>FintechHackEvilnum2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Evilnum21.png</image:loc><image:caption>Evilnum21</image:caption><image:title>Evilnum21</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-indicts-gru-officers-for-notpetya-olympics-attacks-and-more</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-3.png</image:loc><image:caption>InfosecurityMagazinelogo3</image:caption><image:title>InfosecurityMagazinelogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-10-20</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-telling-scary-stories-to-the-board-stop.-heres-why-</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-Scary-blog-1.png</image:loc><image:caption>CISOScaryblog1</image:caption><image:title>CISOScaryblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO_51.png</image:loc><image:caption>CISO51</image:caption><image:title>CISO51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/mischel-kwon-hs.png</image:loc><image:caption>mischelkwonhs</image:caption><image:title>mischelkwonhs</image:title></image:image><lastmod>2021-09-09</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-names-andy-philpott-its-new-emea-general-manager-and-continues-rapid-expansion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/sam-curry-cybereasons-chief-product-officer-on-why-the-mission-matters-in-information-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(68).png</image:loc><image:caption>blogposttext68</image:caption><image:title>blogposttext68</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-05T074007.547.png</image:loc><image:caption>blogposttext20220805T074007547</image:caption><image:title>blogposttext20220805T074007547</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_110973785.jpg</image:loc><image:caption>shutterstock110973785</image:caption><image:title>shutterstock110973785</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-actor-ta505-targets-financial-enterprises-using-lolbins-and-a-new-backdoor-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Frame%20(2).jpg</image:loc><image:caption>Frame2</image:caption><image:title>Frame2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-04-25</lastmod></url><url><loc>https://www.cybereason.com/blog/abandon-ship-cyberattacks-and-the-shipping-industry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shipping.jpg</image:loc><image:caption>shipping</image:caption><image:title>shipping</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/why-ngav-displaced-traditional-antivirus-tools</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(27).png</image:loc><image:caption>blogposttext27</image:caption><image:title>blogposttext27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-11T064615.861.png</image:loc><image:caption>blogposttext20221011T064615861</image:caption><image:title>blogposttext20221011T064615861</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware.png</image:loc><image:caption>ransomware</image:caption><image:title>ransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hospitals-have-become-prime-targets-for-crippling-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vice%20logo.png</image:loc><image:caption>Vicelogo</image:caption><image:title>Vicelogo</image:title></image:image><lastmod>2020-10-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/will-us-indictments-of-iranian-hackers-be-a-deterrent</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo.png</image:loc><image:caption>Bankinfosecuritylogo</image:caption><image:title>Bankinfosecuritylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-09-29</lastmod></url><url><loc>https://www.cybereason.com/blog/panama-papers-show-how-graph-databases-enable-malicious-detection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-3-1024x391.jpg</image:loc><image:caption>Untitleddesign31024x391</image:caption><image:title>Untitleddesign31024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blank-avatar.png</image:loc><image:caption>blankavatar</image:caption><image:title>blankavatar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/soc-dash-23-ram-featured-image.png</image:loc><image:caption>socdash23ramfeaturedimage</image:caption><image:title>socdash23ramfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/resources/boston-security-leaders-answer-your-questions-on-shifting-to-remote-work</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Boston-Hero-AD.jpg</image:loc><image:caption>BostonHeroAD</image:caption><image:title>BostonHeroAD</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2020-06-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/china-hacked-asian-telcos-to-spy-on-uighur-travellers-sources</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/reuters%20logo-1.png</image:loc><image:caption>reuterslogo1</image:caption><image:title>reuterslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-lands-25m-funding-partnership-with-lockheed-martin-look-out-raytheon-and-websense</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CRN-Logo-800x392.png</image:loc><image:caption>CRNLogo800x392</image:caption><image:title>CRNLogo800x392</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/resources/pioneer-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/pioneer-case-study-card.png</image:loc><image:caption>pioneercasestudycard</image:caption><image:title>pioneercasestudycard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/get-ready-for-your-computer-to-be-taken-hostage</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Fast-Company-logo.png</image:loc><image:caption>FastCompanylogo</image:caption><image:title>FastCompanylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/dearcry-ransomeware-and-the-hafnium-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DearCry-blog.png</image:loc><image:caption>DearCryblog</image:caption><image:title>DearCryblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T141451.987.png</image:loc><image:caption>blogposttext20220725T141451987</image:caption><image:title>blogposttext20220725T141451987</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/terms/agreements</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-gdpr-the-state-of-the-cyber-security-regulation-post-brexit</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-3.png</image:loc><image:caption>CybereasonBlogTemplate53</image:caption><image:title>CybereasonBlogTemplate53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_593527700.jpg</image:loc><image:caption>shutterstock593527700</image:caption><image:title>shutterstock593527700</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T083517.794.png</image:loc><image:caption>blogposttext20220907T083517794</image:caption><image:title>blogposttext20220907T083517794</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/meridith-levinson</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Meridith%20Levinson.png</image:loc><image:caption>MeridithLevinson</image:caption><image:title>MeridithLevinson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T071527.904.png</image:loc><image:caption>blogposttext20221006T071527904</image:caption><image:title>blogposttext20221006T071527904</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-15T085736.357.png</image:loc><image:caption>blogposttext20220915T085736357</image:caption><image:title>blogposttext20220915T085736357</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2022%20Holiday%20Ransomware%20Study.png</image:loc><image:caption>2022HolidayRansomwareStudy</image:caption><image:title>2022HolidayRansomwareStudy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(111).png</image:loc><image:caption>blogposttext111</image:caption><image:title>blogposttext111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-05-23</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-qilin-seizes-control</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image7.png</image:loc><image:caption>image7</image:caption><image:title>image7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image4%20copy.jpg</image:loc><image:caption>image4copy</image:caption><image:title>image4copy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image3.png</image:loc><image:caption>image3</image:caption><image:title>image3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image5.png</image:loc><image:caption>image5</image:caption><image:title>image5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image21.png</image:loc><image:caption>image21</image:caption><image:title>image21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image24.png</image:loc><image:caption>image24</image:caption><image:title>image24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image26.png</image:loc><image:caption>image26</image:caption><image:title>image26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image17.png</image:loc><image:caption>image17</image:caption><image:title>image17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image27.png</image:loc><image:caption>image27</image:caption><image:title>image27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image19.png</image:loc><image:caption>image19</image:caption><image:title>image19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image9.png</image:loc><image:caption>image9</image:caption><image:title>image9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image6.png</image:loc><image:caption>image6</image:caption><image:title>image6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image15.jpg</image:loc><image:caption>image15</image:caption><image:title>image15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image13.png</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image10.jpg</image:loc><image:caption>image10</image:caption><image:title>image10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/beast-ransomware-blog-featured.png</image:loc><image:caption>beastransomwareblogfeatured</image:caption><image:title>beastransomwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image11.jpg</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image22.png</image:loc><image:caption>image22</image:caption><image:title>image22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image1.png</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image18.png</image:loc><image:caption>image18</image:caption><image:title>image18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(19).png</image:loc><image:caption>BLOGImagesTemplatev219</image:caption><image:title>BLOGImagesTemplatev219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lummastealer%202.0/evgeny.png</image:loc><image:caption>evgeny</image:caption><image:title>evgeny</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/img.jpg</image:loc><image:caption>img</image:caption><image:title>img</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image23.png</image:loc><image:caption>image23</image:caption><image:title>image23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image14.jpg</image:loc><image:caption>image14</image:caption><image:title>image14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image25.png</image:loc><image:caption>image25</image:caption><image:title>image25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image20.png</image:loc><image:caption>image20</image:caption><image:title>image20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image2.png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image12.png</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Qilin/image16.png</image:loc><image:caption>image16</image:caption><image:title>image16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/mark-tsipershtein-hs.png</image:loc><image:caption>marktsipershteinhs</image:caption><image:title>marktsipershteinhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IBM.png</image:loc><image:caption>IBM</image:caption><image:title>IBM</image:title></image:image><lastmod>2025-06-26</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereasons-evolution-to-disrupt-beyond-siem-and-xdr-market</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cybereason-sdr-evolution-blog-featured-2.png</image:loc><image:caption>cybereasonsdrevolutionblogfeatured2</image:caption><image:title>cybereasonsdrevolutionblogfeatured2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(64).png</image:loc><image:caption>blogposttext64</image:caption><image:title>blogposttext64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94)-1.png</image:loc><image:caption>blogposttext941</image:caption><image:title>blogposttext941</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2024-03-25</lastmod></url><url><loc>https://www.cybereason.com/blog/mitre-attck-evaluation-results</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mitre_Coverage_All_Phases_Light.png</image:loc><image:caption>MitreCoverageAllPhasesLight</image:caption><image:title>MitreCoverageAllPhasesLight</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mitre_Correlation_Light%20(1).png</image:loc><image:caption>MitreCorrelationLight1</image:caption><image:title>MitreCorrelationLight1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mitre_Att&amp;ck_Coverage_Light%20(1).png</image:loc><image:caption>MitreAttckCoverageLight1</image:caption><image:title>MitreAttckCoverageLight1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mitre-overview-1.jpg</image:loc><image:caption>mitreoverview1</image:caption><image:title>mitreoverview1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mitre_Alerts_Light%20(1).png</image:loc><image:caption>MitreAlertsLight1</image:caption><image:title>MitreAlertsLight1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-06-23</lastmod></url><url><loc>https://www.cybereason.com/blog/movies-about-cyber-security-hacking-crime</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-23.jpg</image:loc><image:caption>Untitleddesign23</image:caption><image:title>Untitleddesign23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A9722.jpg</image:loc><image:caption>D0A9722</image:caption><image:title>D0A9722</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FIN7_BadUSB.png</image:loc><image:caption>FIN7BadUSB</image:caption><image:title>FIN7BadUSB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-07-18</lastmod></url><url><loc>https://www.cybereason.com/advisory-board</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/027.Pinchas-Buchris.jpg</image:loc><image:caption>027PinchasBuchris</image:caption><image:title>027PinchasBuchris</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Herman-Young-Profile-Colour1.png</image:loc><image:caption>HermanYoungProfileColour1</image:caption><image:title>HermanYoungProfileColour1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bob-Bigman-CISO-of-CIA.jpg</image:loc><image:caption>BobBigmanCISOofCIA</image:caption><image:title>BobBigmanCISOofCIA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dave%20DeWalt.png</image:loc><image:caption>DaveDeWalt</image:caption><image:title>DaveDeWalt</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Peter-Sherlock-HS-1.png</image:loc><image:caption>PeterSherlockHS1</image:caption><image:title>PeterSherlockHS1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/029.Mike-Gordon.jpg</image:loc><image:caption>029MikeGordon</image:caption><image:title>029MikeGordon</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/026.Richard-Rushing.jpg</image:loc><image:caption>026RichardRushing</image:caption><image:title>026RichardRushing</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/topo-pattern.png</image:loc><image:caption>topopattern</image:caption><image:title>topopattern</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/nickp_color.jpg</image:loc><image:caption>nickpcolor</image:caption><image:title>nickpcolor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Kugan-Headshot.png</image:loc><image:caption>KuganHeadshot</image:caption><image:title>KuganHeadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/025.Edward-Davis.jpg</image:loc><image:caption>025EdwardDavis</image:caption><image:title>025EdwardDavis</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david-kris-hs.jpg</image:loc><image:caption>davidkrishs</image:caption><image:title>davidkrishs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/patrick-ennis-hs.jpg</image:loc><image:caption>patrickennishs</image:caption><image:title>patrickennishs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/024.Gerhard-Eschelbeck.jpg</image:loc><image:caption>024GerhardEschelbeck</image:caption><image:title>024GerhardEschelbeck</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/seth-mccallister.png</image:loc><image:caption>sethmccallister</image:caption><image:title>sethmccallister</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mike-makowka-headshot-1.png</image:loc><image:caption>mikemakowkaheadshot1</image:caption><image:title>mikemakowkaheadshot1</image:title></image:image><lastmod>2020-09-03</lastmod></url><url><loc>https://www.cybereason.com/blog/keeping-pace-with-ai-innovation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/keeping%20up%20with%20ai%20innovation%20blog%20img.png</image:loc><image:caption>keepingupwithaiinnovationblogimg</image:caption><image:title>keepingupwithaiinnovationblogimg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(7).png</image:loc><image:caption>Vs7</image:caption><image:title>Vs7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2025-03-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uk-government-to-introduce-new-regulations-to-make-iot-products-secure-by-design</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Teiss.jpg</image:loc><image:caption>Teiss</image:caption><image:title>Teiss</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/softbank-commits-200m-to-cybereason-cybersecuritys-newest-unicorn</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Xconomy%20logo-2.png</image:loc><image:caption>Xconomylogo2</image:caption><image:title>Xconomylogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2019-08-06</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-is-business-security-certified-by-av-comparatives</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-04-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-quantum-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Michael-Redding-1.jpg</image:loc><image:caption>MichaelRedding1</image:caption><image:title>MichaelRedding1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(6).png</image:loc><image:caption>Maliciouslifepodcast6</image:caption><image:title>Maliciouslifepodcast6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-03-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/gootloader-malware-adopts-new-tactics-to-attack-healthcare-and-finance-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Hacker%20News%20logo-4.jpg</image:loc><image:caption>TheHackerNewslogo4</image:caption><image:title>TheHackerNewslogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2023-02-14</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereasons-podcast-malicious-life-earns-top-20-itunes-ranking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-november-11-live-attack-simulation-ransomware-threat-hunter-series</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(7).png</image:loc><image:caption>CybereasonBlogTemplate7</image:caption><image:title>CybereasonBlogTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Headshot%20image%20template%20(6).png</image:loc><image:caption>CopyofHeadshotimagetemplate6</image:caption><image:title>CopyofHeadshotimagetemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(30).png</image:loc><image:caption>CybereasonBlogTemplate30</image:caption><image:title>CybereasonBlogTemplate30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jj-hex-hs2.png</image:loc><image:caption>jjhexhs2</image:caption><image:title>jjhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-10-29</lastmod></url><url><loc>https://www.cybereason.com/blog/nsa-hackers-use-persistence-not-zero-days-to-breach-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/drone-1000x391.jpg</image:loc><image:caption>drone1000x391</image:caption><image:title>drone1000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(12).png</image:loc><image:caption>blogposttext12</image:caption><image:title>blogposttext12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(35).png</image:loc><image:caption>blogposttext35</image:caption><image:title>blogposttext35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-availability-of-ai-driven-cybereason-xdr-and-edr-on-google-cloud-marketplace</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-03-11</lastmod></url><url><loc>https://www.cybereason.com/blog/to-attackers-all-data-on-a-target-is-useful-when-planning-an-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(35).png</image:loc><image:caption>blogposttext35</image:caption><image:title>blogposttext35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_268212047.jpg</image:loc><image:caption>shutterstock268212047</image:caption><image:title>shutterstock268212047</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sam-curry-being-interviewed-by-cso-magazines-steve-ragan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/network_world.jpg</image:loc><image:caption>networkworld</image:caption><image:title>networkworld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/negotiations-north-korea-nuclear-hack-us-south-korea</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(89).png</image:loc><image:caption>blogposttext89</image:caption><image:title>blogposttext89</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_578167276.jpg</image:loc><image:caption>shutterstock578167276</image:caption><image:title>shutterstock578167276</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-04-03</lastmod></url><url><loc>https://www.cybereason.com/security-all-in-the-ciso-podcast</loc><image:image><image:loc>https://www.cybereason.com/hubfs/gary-hayslip_photo.png</image:loc><image:caption>garyhayslipphoto</image:caption><image:title>garyhayslipphoto</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/All%20In%20Podcast/Sam_Host_card_compressed.png</image:loc><image:caption>SamHostcardcompressed</image:caption><image:title>SamHostcardcompressed</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cecil_Pineda.jpeg</image:loc><image:caption>CecilPineda</image:caption><image:title>CecilPineda</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Schwartz_Ari_LR.jpg</image:loc><image:caption>SchwartzAriLR</image:caption><image:title>SchwartzAriLR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/All%20In%20Podcast/Security_All-In_Logo_On_reduced_size.png</image:loc><image:caption>SecurityAllInLogoOnreducedsize</image:caption><image:title>SecurityAllInLogoOnreducedsize</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/All%20In%20Podcast/Guest_card_Overlay_compressed.png</image:loc><image:caption>GuestcardOverlaycompressed</image:caption><image:title>GuestcardOverlaycompressed</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/chriscastaldo.jpeg</image:loc><image:caption>chriscastaldo</image:caption><image:title>chriscastaldo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/stitcher-listen-badge.png</image:loc><image:caption>stitcherlistenbadge</image:caption><image:title>stitcherlistenbadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/John_Roskoph-868378-edited.jpg</image:loc><image:caption>JohnRoskoph868378edited</image:caption><image:title>JohnRoskoph868378edited</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/KevinFielderJustEatCISOedited-580x358-926457-edited.jpg</image:loc><image:caption>KevinFielderJustEatCISOedited580x358926457edited</image:caption><image:title>KevinFielderJustEatCISOedited580x358926457edited</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wayman-cummings.jpg</image:loc><image:caption>waymancummings</image:caption><image:title>waymancummings</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/en_badge_web_music.png</image:loc><image:caption>enbadgewebmusic</image:caption><image:title>enbadgewebmusic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Anne-Zettlemoyer.jpeg</image:loc><image:caption>AnneZettlemoyer</image:caption><image:title>AnneZettlemoyer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/All%20In%20Podcast/guests/howitt_scott_ISM.jpg</image:loc><image:caption>howittscottISM</image:caption><image:title>howittscottISM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kelley_misata.jpg</image:loc><image:caption>kelleymisata</image:caption><image:title>kelleymisata</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nick_vigier.jpg</image:loc><image:caption>nickvigier</image:caption><image:title>nickvigier</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/andreas-schneider.png</image:loc><image:caption>andreasschneider</image:caption><image:title>andreasschneider</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Guy-Golan-Performanta.jpg</image:loc><image:caption>GuyGolanPerformanta</image:caption><image:title>GuyGolanPerformanta</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/roland-cloutier-largeImage-2-a-1693.jpg</image:loc><image:caption>rolandcloutierlargeImage2a1693</image:caption><image:title>rolandcloutierlargeImage2a1693</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ClayCarter.jpg</image:loc><image:caption>ClayCarter</image:caption><image:title>ClayCarter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Eddie_schwartz_pic.jpeg</image:loc><image:caption>Eddieschwartzpic</image:caption><image:title>Eddieschwartzpic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple_Badge2.png</image:loc><image:caption>AppleBadge2</image:caption><image:title>AppleBadge2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/spotify-podcast-badge-blk-1.png</image:loc><image:caption>spotifypodcastbadgeblk1</image:caption><image:title>spotifypodcastbadgeblk1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Don-welch.jpg</image:loc><image:caption>Donwelch</image:caption><image:title>Donwelch</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tatu-Ylonen-hs.png</image:loc><image:caption>TatuYlonenhs</image:caption><image:title>TatuYlonenhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/All%20In%20Podcast/Security_All-In_Logo_Off_reduced_size.png</image:loc><image:caption>SecurityAllInLogoOffreducedsize</image:caption><image:title>SecurityAllInLogoOffreducedsize</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bob-Bigman-CISO-of-CIA.jpg</image:loc><image:caption>BobBigmanCISOofCIA</image:caption><image:title>BobBigmanCISOofCIA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Michael-Miora-e1522082226623-768x768.jpg</image:loc><image:caption>MichaelMiorae1522082226623768x768</image:caption><image:title>MichaelMiorae1522082226623768x768</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/0-14.jpg</image:loc><image:caption>014</image:caption><image:title>014</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bill_dennings.jpg</image:loc><image:caption>Billdennings</image:caption><image:title>Billdennings</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Adam%20Shostack.jpg</image:loc><image:caption>AdamShostack</image:caption><image:title>AdamShostack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/keith-barros.jpg</image:loc><image:caption>keithbarros</image:caption><image:title>keithbarros</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/All%20In%20Podcast/Cards-Full_Stack_compressed.png</image:loc><image:caption>CardsFullStackcompressed</image:caption><image:title>CardsFullStackcompressed</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/0%20(1)-1.jpg</image:loc><image:caption>011</image:caption><image:title>011</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ed-amoroso.jpg</image:loc><image:caption>edamoroso</image:caption><image:title>edamoroso</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202018-10-19%20at%203.28.06%20PM-1.png</image:loc><image:caption>ScreenShot20181019at32806PM1</image:caption><image:title>ScreenShot20181019at32806PM1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/anton_chevak.jpg</image:loc><image:caption>antonchevak</image:caption><image:title>antonchevak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/lauraLouthanHeadshot.jpg</image:loc><image:caption>lauraLouthanHeadshot</image:caption><image:title>lauraLouthanHeadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/All%20In%20Podcast/All_In_Backof_card_compressed.png</image:loc><image:caption>AllInBackofcardcompressed</image:caption><image:title>AllInBackofcardcompressed</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/stephanie-helm.jpg</image:loc><image:caption>stephaniehelm</image:caption><image:title>stephaniehelm</image:title></image:image><lastmod>2020-11-03</lastmod></url><url><loc>https://www.cybereason.com/resources/the-5-most-pressing-mobile-threats-for-enterprises</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mobile-cracked-hero-1.jpg</image:loc><image:caption>mobilecrackedhero1</image:caption><image:title>mobilecrackedhero1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-08-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/transforming-security-strategies-in-times-of-uncertainty</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Apr-23-2021-02-09-23-26-AM.png</image:loc><image:caption>InfosecurityMagazinelogoApr23202102092326AM</image:caption><image:title>InfosecurityMagazinelogoApr23202102092326AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/securitys-2f2r-syndrome-how-fast-remediation-can-help-hackers-maintain-persistence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T065715.064.png</image:loc><image:caption>blogposttext20221006T065715064</image:caption><image:title>blogposttext20221006T065715064</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-understanding-and-preparing-for-the-next-log4j</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(2).png</image:loc><image:caption>CISOStoriespodcast2</image:caption><image:title>CISOStoriespodcast2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(3).png</image:loc><image:caption>CISOStoriespodcast3</image:caption><image:title>CISOStoriespodcast3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(10)-1.png</image:loc><image:caption>CISOStoriestemplate101</image:caption><image:title>CISOStoriestemplate101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Benny.jpeg</image:loc><image:caption>Benny</image:caption><image:title>Benny</image:title></image:image><lastmod>2022-02-24</lastmod></url><url><loc>https://www.cybereason.com/2021-forrester-wave-for-extended-detection-and-response-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/xdr-wave-featured-image.png</image:loc><image:caption>xdrwavefeaturedimage</image:caption><image:title>xdrwavefeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/Cybereason-XDR-1.png</image:loc><image:caption>CybereasonXDR1</image:caption><image:title>CybereasonXDR1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/xdr-wave-2021-b.png</image:loc><image:caption>xdrwave2021b</image:caption><image:title>xdrwave2021b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/Cybereason-XDR-2.png</image:loc><image:caption>CybereasonXDR2</image:caption><image:title>CybereasonXDR2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/Cybereason-XDR-3.png</image:loc><image:caption>CybereasonXDR3</image:caption><image:title>CybereasonXDR3</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-uncovers-massive-state-sponsored-espionage-operation-leveraging-privately-owned-critical-infrastructure-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10.jpg</image:loc><image:caption>image10</image:caption><image:title>image10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecurity-leadership-risk-exposure-awareness</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-1.png</image:loc><image:caption>Databreachtodaylogo1</image:caption><image:title>Databreachtodaylogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-09-29</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-ghostnet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/26%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>26MALICIOUSLIFE1</image:caption><image:title>26MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(17).png</image:loc><image:caption>MaliciousLifeepisode17</image:caption><image:title>MaliciousLifeepisode17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/pyongyang-calling-gchq-also-now-pins-wannacry-on-north-korea</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-raises-275-million-and-brings-in-steven-mnuchin-and-general-joseph-dunford-as-advisers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Boston%20Globe%20logo-2.png</image:loc><image:caption>BostonGlobelogo2</image:caption><image:title>BostonGlobelogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-07-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/singapore-firms-sitting-ducks-for-ransomware-attacks-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Singapore%20Business%20Review%20logo.jpg</image:loc><image:caption>SingaporeBusinessReviewlogo</image:caption><image:title>SingaporeBusinessReviewlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-can-you-bomb-a-hacker</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Oona-Hathaway.jpeg</image:loc><image:caption>OonaHathaway</image:caption><image:title>OonaHathaway</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Jose-Nazario.jpeg</image:loc><image:caption>JoseNazario</image:caption><image:title>JoseNazario</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-237-card.png</image:loc><image:caption>mlep237card</image:caption><image:title>mlep237card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2024-03-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-adds-mobile-device-protection-to-its-endpoint-protection-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-04-23</lastmod></url><url><loc>https://www.cybereason.com/partners</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-defenders-league-program-guide--thumb.jpg</image:loc><image:caption>crdefendersleagueprogramguidethumb</image:caption><image:title>crdefendersleagueprogramguidethumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon.jpg</image:loc><image:caption>crbgherobluesubtlewithtalon</image:caption><image:title>crbgherobluesubtlewithtalon</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-white-01.png</image:loc><image:caption>crbgsubtlewhite01</image:caption><image:title>crbgsubtlewhite01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/CR_ICONS_MONO-37.svg</image:loc><image:caption>CRICONSMONO37</image:caption><image:title>CRICONSMONO37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/gamechangers-cr-icons-set-newyellow-4-mono-03.svg</image:loc><image:caption>gamechangerscriconssetnewyellow4mono03</image:caption><image:title>gamechangerscriconssetnewyellow4mono03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/CR_ICONS_MONO-02.svg</image:loc><image:caption>CRICONSMONO02</image:caption><image:title>CRICONSMONO02</image:title></image:image><lastmod>2024-03-28</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-effective-health-care-security-is-more-than-hipaa</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Todd%20F.jpg</image:loc><image:caption>ToddF</image:caption><image:title>ToddF</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Erik%20Decker%20-1.png</image:loc><image:caption>ErikDecker1</image:caption><image:title>ErikDecker1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template-1.png</image:loc><image:caption>CISOStoriesTemplate1</image:caption><image:title>CISOStoriesTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-phoenix-keylogger-tries-to-stop-over-80-security-products-to-avoid-detection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zdnet-2.png</image:loc><image:caption>zdnet2</image:caption><image:title>zdnet2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2019-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/operation-bearded-barbie-apt-c-23-campaign-targeting-israeli-officials</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Apr-05-2022-04-10-09-31-PM.png</image:loc><image:caption>CaptureApr05202204100931PM</image:caption><image:title>CaptureApr05202204100931PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Apr-04-2022-09-43-01-44-PM.png</image:loc><image:caption>image8Apr04202209430144PM</image:caption><image:title>image8Apr04202209430144PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Apr-04-2022-09-46-46-99-PM.png</image:loc><image:caption>image9Apr04202209464699PM</image:caption><image:title>image9Apr04202209464699PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image34-Apr-04-2022-09-17-54-57-PM.png</image:loc><image:caption>image34Apr04202209175457PM</image:caption><image:title>image34Apr04202209175457PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image33-Apr-04-2022-07-10-04-18-PM.png</image:loc><image:caption>image33Apr04202207100418PM</image:caption><image:title>image33Apr04202207100418PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Apr-04-2022-09-44-33-53-PM.png</image:loc><image:caption>image12Apr04202209443353PM</image:caption><image:title>image12Apr04202209443353PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image26-Apr-04-2022-07-10-49-62-PM.png</image:loc><image:caption>image26Apr04202207104962PM</image:caption><image:title>image26Apr04202207104962PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Apr-04-2022-09-28-17-31-PM.png</image:loc><image:caption>image14Apr04202209281731PM</image:caption><image:title>image14Apr04202209281731PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-Apr-04-2022-07-11-28-24-PM.png</image:loc><image:caption>image18Apr04202207112824PM</image:caption><image:title>image18Apr04202207112824PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image30-Apr-04-2022-09-42-15-52-PM.png</image:loc><image:caption>image30Apr04202209421552PM</image:caption><image:title>image30Apr04202209421552PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Apr-04-2022-09-45-46-43-PM.png</image:loc><image:caption>image15Apr04202209454643PM</image:caption><image:title>image15Apr04202209454643PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image29-Apr-04-2022-09-47-36-76-PM.png</image:loc><image:caption>image29Apr04202209473676PM</image:caption><image:title>image29Apr04202209473676PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Apr-04-2022-07-08-32-42-PM.png</image:loc><image:caption>image2Apr04202207083242PM</image:caption><image:title>image2Apr04202207083242PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image28-Apr-04-2022-09-31-11-90-PM.png</image:loc><image:caption>image28Apr04202209311190PM</image:caption><image:title>image28Apr04202209311190PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27-Apr-04-2022-09-35-15-49-PM.png</image:loc><image:caption>image27Apr04202209351549PM</image:caption><image:title>image27Apr04202209351549PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Apr-04-2022-09-50-19-14-PM.png</image:loc><image:caption>image6Apr04202209501914PM</image:caption><image:title>image6Apr04202209501914PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image31-Apr-04-2022-09-26-41-50-PM.png</image:loc><image:caption>image31Apr04202209264150PM</image:caption><image:title>image31Apr04202209264150PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image25-Apr-04-2022-09-34-19-10-PM.png</image:loc><image:caption>image25Apr04202209341910PM</image:caption><image:title>image25Apr04202209341910PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image35-Apr-04-2022-09-27-14-39-PM.png</image:loc><image:caption>image35Apr04202209271439PM</image:caption><image:title>image35Apr04202209271439PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-Apr-04-2022-07-13-09-02-PM.png</image:loc><image:caption>image19Apr04202207130902PM</image:caption><image:title>image19Apr04202207130902PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Apr-04-2022-09-39-53-31-PM.png</image:loc><image:caption>image7Apr04202209395331PM</image:caption><image:title>image7Apr04202209395331PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-Apr-04-2022-09-29-24-39-PM.png</image:loc><image:caption>image23Apr04202209292439PM</image:caption><image:title>image23Apr04202209292439PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Apr-04-2022-09-25-36-98-PM.png</image:loc><image:caption>image16Apr04202209253698PM</image:caption><image:title>image16Apr04202209253698PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Apr-04-2022-09-48-36-50-PM.png</image:loc><image:caption>image11Apr04202209483650PM</image:caption><image:title>image11Apr04202209483650PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-Apr-04-2022-07-12-15-96-PM.png</image:loc><image:caption>image20Apr04202207121596PM</image:caption><image:title>image20Apr04202207121596PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Apr-04-2022-09-43-44-05-PM.png</image:loc><image:caption>image1Apr04202209434405PM</image:caption><image:title>image1Apr04202209434405PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Apr-04-2022-09-37-09-40-PM.png</image:loc><image:caption>image13Apr04202209370940PM</image:caption><image:title>image13Apr04202209370940PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-Apr-04-2022-09-38-42-36-PM.png</image:loc><image:caption>image17Apr04202209384236PM</image:caption><image:title>image17Apr04202209384236PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Apr-04-2022-09-38-00-07-PM.png</image:loc><image:caption>image10Apr04202209380007PM</image:caption><image:title>image10Apr04202209380007PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-Apr-04-2022-09-36-20-24-PM.png</image:loc><image:caption>image24Apr04202209362024PM</image:caption><image:title>image24Apr04202209362024PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image36-4.png</image:loc><image:caption>image364</image:caption><image:title>image364</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Apr-04-2022-09-17-02-91-PM.png</image:loc><image:caption>image3Apr04202209170291PM</image:caption><image:title>image3Apr04202209170291PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-Apr-04-2022-09-32-52-93-PM.png</image:loc><image:caption>image21Apr04202209325293PM</image:caption><image:title>image21Apr04202209325293PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image22-Apr-04-2022-09-19-03-94-PM.png</image:loc><image:caption>image22Apr04202209190394PM</image:caption><image:title>image22Apr04202209190394PM</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-should-be-on-the-next-presidents-cybersecurity-agenda</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/conomy.jpg</image:loc><image:caption>conomy</image:caption><image:title>conomy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/fbi-warns-us-companies-to-avoid-malicious-usb-devices</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/yossi-hs.png</image:loc><image:caption>yossihs</image:caption><image:title>yossihs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(33).png</image:loc><image:caption>blogposttext33</image:caption><image:title>blogposttext33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FIN7_BadUSB.png</image:loc><image:caption>FIN7BadUSB</image:caption><image:title>FIN7BadUSB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-02-23</lastmod></url><url><loc>https://www.cybereason.com/company/events</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg-inspektus-wireframe-wing.png</image:loc><image:caption>crbginspektuswireframewing</image:caption><image:title>crbginspektuswireframewing</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-11-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/oracle-cybereason-stretch-security-from-endpoints-to-cloud</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SDX%20Central%20logo-2.png</image:loc><image:caption>SDXCentrallogo2</image:caption><image:title>SDXCentrallogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/ar/platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-air-gapped.svg</image:loc><image:caption>smalliconairgapped</image:caption><image:title>smalliconairgapped</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-windows.svg</image:loc><image:caption>smalliconwindows</image:caption><image:title>smalliconwindows</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/CR_Disovery_Board.png</image:loc><image:caption>CRDisoveryBoard</image:caption><image:title>CRDisoveryBoard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILITY_HUNTING_CR_ICONS-13.svg</image:loc><image:caption>VISIBILITYHUNTINGCRICONS13</image:caption><image:title>VISIBILITYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/nbm-malop-graphic.png</image:loc><image:caption>nbmmalopgraphic</image:caption><image:title>nbmmalopgraphic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-hybrid.svg</image:loc><image:caption>smalliconhybrid</image:caption><image:title>smalliconhybrid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-right-2.svg</image:loc><image:caption>futurereadyright2</image:caption><image:title>futurereadyright2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__optional-100px.png</image:loc><image:caption>crchartoptional100px</image:caption><image:title>crchartoptional100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-android.svg</image:loc><image:caption>smalliconandroid</image:caption><image:title>smalliconandroid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-right-1.svg</image:loc><image:caption>futurereadyright1</image:caption><image:title>futurereadyright1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/REALTIME_PROTECTION_MULTILAYERED_CR_ICONS-04.svg</image:loc><image:caption>REALTIMEPROTECTIONMULTILAYEREDCRICONS04</image:caption><image:title>REALTIMEPROTECTIONMULTILAYEREDCRICONS04</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-on-prem.svg</image:loc><image:caption>smallicononprem</image:caption><image:title>smallicononprem</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-left-2.svg</image:loc><image:caption>futurereadyleft2</image:caption><image:title>futurereadyleft2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-apple.svg</image:loc><image:caption>smalliconapple</image:caption><image:title>smalliconapple</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-yellowBG-100px.png</image:loc><image:caption>crchartcheckmarkyellowBG100px</image:caption><image:title>crchartcheckmarkyellowBG100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-defense-platform-data-sheet--ar-thumbnail.jpg</image:loc><image:caption>crdefenseplatformdatasheetarthumbnail</image:caption><image:title>crdefenseplatformdatasheetarthumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-feature__flex--shape-collage.png</image:loc><image:caption>crbgfeatureflexshapecollage</image:caption><image:title>crbgfeatureflexshapecollage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-left-1.svg</image:loc><image:caption>futurereadyleft1</image:caption><image:title>futurereadyleft1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-100px.png</image:loc><image:caption>crchartcheckmark100px</image:caption><image:title>crchartcheckmark100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/footer-line.svg</image:loc><image:caption>footerline</image:caption><image:title>footerline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-cloud.svg</image:loc><image:caption>smalliconcloud</image:caption><image:title>smalliconcloud</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-linux.svg</image:loc><image:caption>smalliconlinux</image:caption><image:title>smalliconlinux</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PLATFORM2_CR_ICONS-02.svg</image:loc><image:caption>PLATFORM2CRICONS02</image:caption><image:title>PLATFORM2CRICONS02</image:title></image:image><lastmod>2021-09-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/china-backed-winnti-apt-siphons-reams-of-us-trade-secrets-in-sprawling-cyber-espionage-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-May-09-2022-02-56-17-55-PM.png</image:loc><image:caption>DarkReadinglogoMay09202202561755PM</image:caption><image:title>DarkReadinglogoMay09202202561755PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/beware-the-raccoon-stealer-it-aint-no-furry-friend</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LightReading%20Security%20Now.png</image:loc><image:caption>LightReadingSecurityNow</image:caption><image:title>LightReadingSecurityNow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2019-11-05</lastmod></url><url><loc>https://www.cybereason.com/3-ways-to-enhance-your-security-posture-with-the-mitre-attack-framework</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logo.png</image:loc><image:caption>crowllogo</image:caption><image:title>crowllogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fast_Movement_2500.jpg</image:loc><image:caption>FastMovement2500</image:caption><image:title>FastMovement2500</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dani-wood.png</image:loc><image:caption>daniwood</image:caption><image:title>daniwood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Resha-HS.png</image:loc><image:caption>ReshaHS</image:caption><image:title>ReshaHS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Blog-Hero-2.jpg</image:loc><image:caption>MITREBlogHero2</image:caption><image:title>MITREBlogHero2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Israel-Barak.png</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><lastmod>2020-07-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/xdr-three-reasons-it-should-drive-your-security-strategy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybersecurity%20Insiders%20logo.png</image:loc><image:caption>CybersecurityInsiderslogo</image:caption><image:title>CybersecurityInsiderslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/msa</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2025-03-12</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-announces-latest-speakers-to-join-deep-2017</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/fundamentals/what-are-advanced-persistent-threats</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/dark-metal-background.png</image:loc><image:caption>darkmetalbackground</image:caption><image:title>darkmetalbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/101-what-is-apt-featured.png</image:loc><image:caption>101whatisaptfeatured</image:caption><image:title>101whatisaptfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-20</lastmod></url><url><loc>https://www.cybereason.com/blog/how-does-ransomware-work</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(67).png</image:loc><image:caption>blogposttext67</image:caption><image:title>blogposttext67</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(7).png</image:loc><image:caption>blogposttext7</image:caption><image:title>blogposttext7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_365531273.jpg</image:loc><image:caption>shutterstock365531273</image:caption><image:title>shutterstock365531273</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2023-02-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/maker-of-sneaky-mac-adware-sends-security-researcher-cease-and-desist-letters</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/zdnet-logo-large.png</image:loc><image:caption>zdnetlogolarge</image:caption><image:title>zdnetlogolarge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/resources/attack-simulation-series</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/owl-attack-sim-card.png</image:loc><image:caption>owlattacksimcard</image:caption><image:title>owlattacksimcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/blog/variant-payload-prevention-fuzzy-similarity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/variant-payload-prevention.png</image:loc><image:caption>variantpayloadprevention</image:caption><image:title>variantpayloadprevention</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gradual%20similarity%20Qakbot.png</image:loc><image:caption>gradualsimilarityQakbot</image:caption><image:title>gradualsimilarityQakbot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(17).png</image:loc><image:caption>BLOGImagesTemplatev217</image:caption><image:title>BLOGImagesTemplatev217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/yonatan-perry.jpeg</image:loc><image:caption>yonatanperry</image:caption><image:title>yonatanperry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Qakbot%20fuzzy%20similarity.png</image:loc><image:caption>Qakbotfuzzysimilarity</image:caption><image:title>Qakbotfuzzysimilarity</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/uri-sternfeld.jpeg</image:loc><image:caption>uristernfeld</image:caption><image:title>uristernfeld</image:title></image:image><lastmod>2023-03-07</lastmod></url><url><loc>https://www.cybereason.com/blog/holiday-weekend-ransomware-attacks-continue-to-hit-companies-hard</loc><image:image><image:loc>https://www.cybereason.com/hubfs/2022%20Holiday%20Ransomware%20Study.png</image:loc><image:caption>2022HolidayRansomwareStudy</image:caption><image:title>2022HolidayRansomwareStudy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Meridith%20Levinson.png</image:loc><image:caption>MeridithLevinson</image:caption><image:title>MeridithLevinson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(23).png</image:loc><image:caption>CybereasonBlogTemplate23</image:caption><image:title>CybereasonBlogTemplate23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-11-17</lastmod></url><url><loc>https://www.cybereason.com/blog/smart-filtering-smart-sampling-and-smart-scaling</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/yossi-hs.png</image:loc><image:caption>yossihs</image:caption><image:title>yossihs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Smart-Filtering-Blog-1.png</image:loc><image:caption>SmartFilteringBlog1</image:caption><image:title>SmartFilteringBlog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-alert-microsoft-exchange-proxyshell-exploits-and-lockfile-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-36-22-11-PM.png</image:loc><image:caption>unnamedSep14202108362211PM</image:caption><image:title>unnamedSep14202108362211PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-38-20-07-PM.png</image:loc><image:caption>unnamedSep14202108382007PM</image:caption><image:title>unnamedSep14202108382007PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(5).png</image:loc><image:caption>CopyofThreatAlertAnalysis5</image:caption><image:title>CopyofThreatAlertAnalysis5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-35-13-81-PM.png</image:loc><image:caption>unnamedSep14202108351381PM</image:caption><image:title>unnamedSep14202108351381PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-37-22-74-PM.png</image:loc><image:caption>unnamedSep14202108372274PM</image:caption><image:title>unnamedSep14202108372274PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-32-43-56-PM.png</image:loc><image:caption>unnamedSep14202108324356PM</image:caption><image:title>unnamedSep14202108324356PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-55-30-03-PM.png</image:loc><image:caption>unnamedSep14202108553003PM</image:caption><image:title>unnamedSep14202108553003PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-53-53-18-PM.png</image:loc><image:caption>unnamedSep14202108535318PM</image:caption><image:title>unnamedSep14202108535318PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-39-27-97-PM.png</image:loc><image:caption>unnamedSep14202108392797PM</image:caption><image:title>unnamedSep14202108392797PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-34-04-45-PM.png</image:loc><image:caption>unnamedSep14202108340445PM</image:caption><image:title>unnamedSep14202108340445PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/xdr-moving-beyound-the-limits-of-siem-and-soar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(36).png</image:loc><image:caption>blogposttext36</image:caption><image:title>blogposttext36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(1)-1.png</image:loc><image:caption>CybereasonBlogTemplate11</image:caption><image:title>CybereasonBlogTemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(99).png</image:loc><image:caption>blogposttext99</image:caption><image:title>blogposttext99</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/oni-ransomware-used-in-month-long-attacks-against-japanese-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Bleeping-Computer1.png</image:loc><image:caption>BleepingComputer1</image:caption><image:title>BleepingComputer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-evilnum-group-is-now-deploying-a-new-rat-called-pyvil</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Technadu%20logo.png</image:loc><image:caption>Technadulogo</image:caption><image:title>Technadulogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-09-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-and-oracle-team-up-for-security-at-scale-from-the-endpoint-to-the-cloud</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Boulevard%20logo-1.png</image:loc><image:caption>SecurityBoulevardlogo1</image:caption><image:title>SecurityBoulevardlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cybereason-ciso-interview-series-show-the-risks-and-how-youre-addressing-them</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/CSIO_int_feature_luis.jpg</image:loc><image:caption>CSIOintfeatureluis</image:caption><image:title>CSIOintfeatureluis</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Would%20Happen%20if%20CBS%20Got%20Hacked.png</image:loc><image:caption>WhatWouldHappenifCBSGotHacked</image:caption><image:title>WhatWouldHappenifCBSGotHacked</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/LuisTorres.jpg</image:loc><image:caption>LuisTorres</image:caption><image:title>LuisTorres</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs.-clop-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-vs-clop-ransomware-blog-6.png</image:loc><image:caption>crvsclopransomwareblog6</image:caption><image:title>crvsclopransomwareblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-vs-clop-ransomware-blog-7.png</image:loc><image:caption>crvsclopransomwareblog7</image:caption><image:title>crvsclopransomwareblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-vs-clop-ransomware-blog-10.png</image:loc><image:caption>crvsclopransomwareblog10</image:caption><image:title>crvsclopransomwareblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-vs-clop-ransomware-blog-8.png</image:loc><image:caption>crvsclopransomwareblog8</image:caption><image:title>crvsclopransomwareblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-vs-clop-ransomware-blog-3.png</image:loc><image:caption>crvsclopransomwareblog3</image:caption><image:title>crvsclopransomwareblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-vs-clop-ransomware-blog-1.png</image:loc><image:caption>crvsclopransomwareblog1</image:caption><image:title>crvsclopransomwareblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-vs-clop-ransomware-blog-9.png</image:loc><image:caption>crvsclopransomwareblog9</image:caption><image:title>crvsclopransomwareblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template-2.png</image:loc><image:caption>CybereasonVsTemplate2</image:caption><image:title>CybereasonVsTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-vs-clop-ransomware-blog-4.png</image:loc><image:caption>crvsclopransomwareblog4</image:caption><image:title>crvsclopransomwareblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-vs-clop-ransomware-blog-2.png</image:loc><image:caption>crvsclopransomwareblog2</image:caption><image:title>crvsclopransomwareblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-vs-clop-ransomware-blog-11.png</image:loc><image:caption>crvsclopransomwareblog11</image:caption><image:title>crvsclopransomwareblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/cr-vs-clop-ransomware-blog-5.png</image:loc><image:caption>crvsclopransomwareblog5</image:caption><image:title>crvsclopransomwareblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-snags-three-channel-leaders</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN%20logo-4.png</image:loc><image:caption>CRNlogo4</image:caption><image:title>CRNlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-03-01</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-named-a-super-60-company-by-jmp-securities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-empowers-partners-with-north-american-mssp-program-expansion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/PAYG.png</image:loc><image:caption>PAYG</image:caption><image:title>PAYG</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP-blog-1.png</image:loc><image:caption>MSSPblog1</image:caption><image:title>MSSPblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><lastmod>2021-10-22</lastmod></url><url><loc>https://www.cybereason.com/blog/unlocking-the-potential-of-ai-in-cybersecurity-embracing-the-future-and-its-complexities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(15)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews151</image:caption><image:title>CopyofBLOGSOCIALSETNews151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ai-potential-cybersecurity-featured.png</image:loc><image:caption>aipotentialcybersecurityfeatured</image:caption><image:title>aipotentialcybersecurityfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-2.png</image:loc><image:caption>CybereasonBlogTemplate152</image:caption><image:title>CybereasonBlogTemplate152</image:title></image:image><lastmod>2024-10-24</lastmod></url><url><loc>https://www.cybereason.com/blog/gdpr-security-attackers-fines-extortion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_375874333.jpg</image:loc><image:caption>shutterstock375874333</image:caption><image:title>shutterstock375874333</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MATAN.jpeg</image:loc><image:caption>MATAN</image:caption><image:title>MATAN</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(21).png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(114).png</image:loc><image:caption>blogposttext114</image:caption><image:title>blogposttext114</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-03-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/rodney-thorne-returns-to-run-regional-channel-at-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ResellerNews.jpg</image:loc><image:caption>ResellerNews</image:caption><image:title>ResellerNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2018-12-03</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-a-top-place-to-work-in-2020-by-the-boston-globe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecurity-firms-take-the-offensive-while-avoiding-all-out-war</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsweek%20logo-2.png</image:loc><image:caption>Newsweeklogo2</image:caption><image:title>Newsweeklogo2</image:title></image:image><lastmod>2021-07-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fixes-for-log4j-flaw-arise-as-attacks-soar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Searchsecurity%20logo-1.jpg</image:loc><image:caption>Searchsecuritylogo1</image:caption><image:title>Searchsecuritylogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-april-27th-solving-the-incident-response-data-problem</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IBM.png</image:loc><image:caption>IBM</image:caption><image:title>IBM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Jim-Hung-circle.png</image:loc><image:caption>JimHungcircle</image:caption><image:title>JimHungcircle</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-29T075130.403.png</image:loc><image:caption>blogposttext20220929T075130403</image:caption><image:title>blogposttext20220929T075130403</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(30).png</image:loc><image:caption>CybereasonBlogTemplate30</image:caption><image:title>CybereasonBlogTemplate30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/John-Dwyer-circle.png</image:loc><image:caption>JohnDwyercircle</image:caption><image:title>JohnDwyercircle</image:title></image:image><lastmod>2022-04-07</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-career-board-management-briefing-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(10)-1.png</image:loc><image:caption>CISOStoriestemplate101</image:caption><image:title>CISOStoriestemplate101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_243859654.jpg</image:loc><image:caption>shutterstock243859654</image:caption><image:title>shutterstock243859654</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-11-28</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-labs-research-operation-kofer-new-mutating-ransomware-group</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_161163569-1024x391.jpg</image:loc><image:caption>shutterstock1611635691024x391</image:caption><image:title>shutterstock1611635691024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/webinar.png</image:loc><image:caption>webinar</image:caption><image:title>webinar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-best-free-antivirus-protection-of-2018</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/PC-Magazine.png</image:loc><image:caption>PCMagazine</image:caption><image:title>PCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/resources/securely-maintain-business-continuity-with-a-remote-workforce-emergency-checklist</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Team%20Attack%20Lab/Aerial_Landscape_1920x1080.jpg</image:loc><image:caption>AerialLandscape1920x1080</image:caption><image:title>AerialLandscape1920x1080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2020-03-17</lastmod></url><url><loc>https://www.cybereason.com/blog/automating-the-r-in-your-xdr-strategy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-1.png</image:loc><image:caption>CybereasonBlogTemplate151</image:caption><image:title>CybereasonBlogTemplate151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog_automatingR.png</image:loc><image:caption>blogautomatingR</image:caption><image:title>blogautomatingR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-12T072834.369-1.png</image:loc><image:caption>blogposttext20221012T0728343691</image:caption><image:title>blogposttext20221012T0728343691</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-03-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ebay-wants-users-to-change-passwords-after-being-hacked</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/vator_tv.jpg</image:loc><image:caption>vatortv</image:caption><image:title>vatortv</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/quicktake-what-is-darkside-and-how-does-it-operate</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20National%20(Middle%20East)%20logo-3.png</image:loc><image:caption>TheNationalMiddleEastlogo3</image:caption><image:title>TheNationalMiddleEastlogo3</image:title></image:image><lastmod>2021-05-13</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-investigation-of-massive-global-telco-breaches-leads-to-the-launch-of-new-replay-product-to-break-the-low-and-slow-cyber-attack-paradigm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/for-hacked-companies-paying-a-ransom-may-not-work-many-say-they-paid-but-were-attacked-again</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Boston%20Globe%20logo-1.png</image:loc><image:caption>BostonGlobelogo1</image:caption><image:title>BostonGlobelogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-why-commodity-threats-shouldnt-be-dismissed-so-quickly</loc><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>140MALICIOUSLIFE</image:caption><image:title>140MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(21).png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/APAC/Webinar/20201030/APAC_webinar_hero_2020-10-30.jpg</image:loc><image:caption>APACwebinarhero20201030</image:caption><image:title>APACwebinarhero20201030</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-11-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/honeypot-lures-hackers-to-reveal-ics-attack-tactics</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ComputerBusinessReview%20logo.jpg</image:loc><image:caption>ComputerBusinessReviewlogo</image:caption><image:title>ComputerBusinessReviewlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-08-16</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-mec-networks-corporation-partner-to-protect-organizations-in-the-philippines-from-sophisticated-cyber-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-10-05</lastmod></url><url><loc>https://www.cybereason.com/blog/time-for-an-upgrade-how-to-switch-from-symantec-to-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Symantec_LandingPage_Banner-8.png</image:loc><image:caption>SymantecLandingPageBanner8</image:caption><image:title>SymantecLandingPageBanner8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Limor%20Wainstein%20HS.jpg</image:loc><image:caption>LimorWainsteinHS</image:caption><image:title>LimorWainsteinHS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-named-a-2018-sc-awards-finalist</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-03-28</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-named-to-the-big-50-2016-startup-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/6-reasons-why-hackers-are-ahead-of-the-game-and-tips-to-close-the-gap</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(52).png</image:loc><image:caption>blogposttext52</image:caption><image:title>blogposttext52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(82).png</image:loc><image:caption>blogposttext82</image:caption><image:title>blogposttext82</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-announces-deep-hunting-tour</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-cybersecurity-question-that-should-be-asked-of-both-presidential-candidates-what-will-you-do-in-the-first-hundred-days</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/botnets-are-now-the-new-rapidly-growing-hacking-techniques</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-04-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ex-amazon-exec-admits-strangers-do-listen-to-you-and-turns-his-alexa-off</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Sun-2.gif</image:loc><image:caption>TheSun2</image:caption><image:title>TheSun2</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://www.cybereason.com/blog/ever-evolving-rachel-tobac-talks-social-engineering</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee.png</image:loc><image:caption>Employee</image:caption><image:title>Employee</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/rachel-tobak-hs.png</image:loc><image:caption>racheltobakhs</image:caption><image:title>racheltobakhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ever-Evolving-Rachel-Tobac-Card.png</image:loc><image:caption>EverEvolvingRachelTobacCard</image:caption><image:title>EverEvolvingRachelTobacCard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/blog/research/information-stealing-malware-targeting-brazil-full-research</loc><image:image><image:loc>https://www.cybereason.com/hubfs/soulto.png</image:loc><image:caption>soulto</image:caption><image:title>soulto</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jsfile3.png</image:loc><image:caption>jsfile3</image:caption><image:title>jsfile3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(84).png</image:loc><image:caption>blogposttext84</image:caption><image:title>blogposttext84</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/monitor98.png</image:loc><image:caption>monitor98</image:caption><image:title>monitor98</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/lnk-1.png</image:loc><image:caption>lnk1</image:caption><image:title>lnk1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3%20ways.png</image:loc><image:caption>3ways</image:caption><image:title>3ways</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/best-korea-fingered-for-hacks-against-bitcoin-exchanges-in-south</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/The-Register-800x267.jpg</image:loc><image:caption>TheRegister800x267</image:caption><image:title>TheRegister800x267</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/python-based-spy-rat-emerges-to-target-fintech</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ThreatPost%20logo.png</image:loc><image:caption>ThreatPostlogo</image:caption><image:title>ThreatPostlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-09-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/factbox-darkside-hackers-in-focus-after-toshiba-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Reuters%20logo-May-15-2021-01-47-52-51-AM.png</image:loc><image:caption>ReuterslogoMay15202101475251AM</image:caption><image:title>ReuterslogoMay15202101475251AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-05-15</lastmod></url><url><loc>https://www.cybereason.com/resources/ransomops-and-the-ransomware-economy-whitepaper</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RansomOps.png</image:loc><image:caption>RansomOps</image:caption><image:title>RansomOps</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-04-12</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-ciso-israel-barak-to-speak-on-multi-stage-ransomware-attacks-at-the-rsac-365-virtual-summit</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-01-27</lastmod></url><url><loc>https://www.cybereason.com/blog/the-cybereason-approach-to-sensor-tamper-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-2.jpg</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8481.png</image:loc><image:caption>IMG8481</image:caption><image:title>IMG8481</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T083517.794.png</image:loc><image:caption>blogposttext20220907T083517794</image:caption><image:title>blogposttext20220907T083517794</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-3.png</image:loc><image:caption>CybereasonBlogTemplate53</image:caption><image:title>CybereasonBlogTemplate53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-09-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-botnet-named-after-prometheus-is-also-exploiting-exchange-server-flaws</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cyberscoop%20logo-Apr-23-2021-01-40-17-30-AM.png</image:loc><image:caption>CyberscooplogoApr23202101401730AM</image:caption><image:title>CyberscooplogoApr23202101401730AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iot-broadens-attack-surface-of-smart-cities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Govt-Computer-News-1.png</image:loc><image:caption>GovtComputerNews1</image:caption><image:title>GovtComputerNews1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/platform/bundles</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-100px.png</image:loc><image:caption>crchartcheckmark100px</image:caption><image:title>crchartcheckmark100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-yellowBG-100px.png</image:loc><image:caption>crchartcheckmarkyellowBG100px</image:caption><image:title>crchartcheckmarkyellowBG100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__optional-100px.png</image:loc><image:caption>crchartoptional100px</image:caption><image:title>crchartoptional100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><lastmod>2022-10-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-ciso-to-deliver-keynote-at-infosecurity-north-america</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-makes-log4shell-vaccine-available</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Boulevard%20logo-2.png</image:loc><image:caption>SecurityBoulevardlogo2</image:caption><image:title>SecurityBoulevardlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/authentication-platform-okta-investigates-alleged-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(54).png</image:loc><image:caption>blogposttext54</image:caption><image:title>blogposttext54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T070701.315.png</image:loc><image:caption>blogposttext20220830T070701315</image:caption><image:title>blogposttext20220830T070701315</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FObDkfXXwAAVtlg.png</image:loc><image:caption>FObDkfXXwAAVtlg</image:caption><image:title>FObDkfXXwAAVtlg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(2)-1.png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-to-host-webinar-on-march-4-2015</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-25</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-notpetyas-fiscal-impact-revised-892-5-million-and-growing</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(85).png</image:loc><image:caption>blogposttext85</image:caption><image:title>blogposttext85</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/fedex_feature.jpg</image:loc><image:caption>fedexfeature</image:caption><image:title>fedexfeature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(3)-2.png</image:loc><image:caption>CISOStoriestemplate32</image:caption><image:title>CISOStoriestemplate32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-best-ransomware-protection-of-2017</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/PC-Magazine.png</image:loc><image:caption>PCMagazine</image:caption><image:title>PCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-receives-five-star-rating-from-sc-magazine</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-28</lastmod></url><url><loc>https://www.cybereason.com/platform/endpoint-controls</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/malop-infographic-cover.png</image:loc><image:caption>malopinfographiccover</image:caption><image:title>malopinfographiccover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/CR_Malware_Alerts.png</image:loc><image:caption>CRMalwareAlerts</image:caption><image:title>CRMalwareAlerts</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EASY_INVESTIGATION_REMEDIATION_CR_ICONS-10.svg</image:loc><image:caption>EASYINVESTIGATIONREMEDIATIONCRICONS10</image:caption><image:title>EASYINVESTIGATIONREMEDIATIONCRICONS10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/olist-cover-thumb-small.png</image:loc><image:caption>olistcoverthumbsmall</image:caption><image:title>olistcoverthumbsmall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PREVENTION_CR_ICONS-21.svg</image:loc><image:caption>PREVENTIONCRICONS21</image:caption><image:title>PREVENTIONCRICONS21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/mitre-2023-resource-card.png</image:loc><image:caption>mitre2023resourcecard</image:caption><image:title>mitre2023resourcecard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/OPTIMIZE_SECURITY_OPS_CR_ICONS-20.svg</image:loc><image:caption>OPTIMIZESECURITYOPSCRICONS20</image:caption><image:title>OPTIMIZESECURITYOPSCRICONS20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Endpoint%20controls%202%20query.png</image:loc><image:caption>Endpointcontrols2query</image:caption><image:title>Endpointcontrols2query</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Endpoint%20Controls%203%20firewall%20control.png</image:loc><image:caption>EndpointControls3firewallcontrol</image:caption><image:title>EndpointControls3firewallcontrol</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Endpoint%20controls%201%20main%20page.png</image:loc><image:caption>Endpointcontrols1mainpage</image:caption><image:title>Endpointcontrols1mainpage</image:title></image:image><lastmod>2024-01-10</lastmod></url><url><loc>https://www.cybereason.com/resources/battle-to-address-mobile</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Battle-Mobile-Banner-Resources.png</image:loc><image:caption>BattleMobileBannerResources</image:caption><image:title>BattleMobileBannerResources</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2020-08-04</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-bitcoin-exchanges-in-south-korea-hacked-and-north-korea-is-prime-suspect</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/exdr-buyers-guide-23-blog-featured.png</image:loc><image:caption>exdrbuyersguide23blogfeatured</image:caption><image:title>exdrbuyersguide23blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/bitcoin-dprk.png</image:loc><image:caption>bitcoindprk</image:caption><image:title>bitcoindprk</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-24</lastmod></url><url><loc>https://www.cybereason.com/platform/threat-intelligence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/INTERVIEW_CR_ICONS_BATCH_2%20copy-18.svg</image:loc><image:caption>INTERVIEWCRICONSBATCH2copy18</image:caption><image:title>INTERVIEWCRICONSBATCH2copy18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/mitre-r4-1-pager-cover.png</image:loc><image:caption>mitrer41pagercover</image:caption><image:title>mitrer41pagercover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/BUSINESS_PROCESS_CR_ICONS_BATCH_2%20copy-19.svg</image:loc><image:caption>BUSINESSPROCESSCRICONSBATCH2copy19</image:caption><image:title>BUSINESSPROCESSCRICONSBATCH2copy19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/olist-cover-thumb-small.png</image:loc><image:caption>olistcoverthumbsmall</image:caption><image:title>olistcoverthumbsmall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/Cybereason%20Build%20A%20Query%20Screen.png</image:loc><image:caption>CybereasonBuildAQueryScreen</image:caption><image:title>CybereasonBuildAQueryScreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malop%20details-1.png</image:loc><image:caption>Malopdetails1</image:caption><image:title>Malopdetails1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/malop-infographic-cover.png</image:loc><image:caption>malopinfographiccover</image:caption><image:title>malopinfographiccover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/IMPLANT_DEPLOYED_CR_ICONS_BATCH_2%20copy-02.svg</image:loc><image:caption>IMPLANTDEPLOYEDCRICONSBATCH2copy02</image:caption><image:title>IMPLANTDEPLOYEDCRICONSBATCH2copy02</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/how-netflix-learned-cloud-security-ml-b-side</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(1)-1.png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(29).png</image:loc><image:caption>MaliciousLifeepisode29</image:caption><image:title>MaliciousLifeepisode29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/anthony-m-freed</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(18).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews18</image:caption><image:title>CopyofBLOGSOCIALSETNews18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(1).png</image:loc><image:caption>CybereasonBlogtemplate1</image:caption><image:title>CybereasonBlogtemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(93).png</image:loc><image:caption>blogposttext93</image:caption><image:title>blogposttext93</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(22).png</image:loc><image:caption>blogposttext22</image:caption><image:title>blogposttext22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware.png</image:loc><image:caption>ransomware</image:caption><image:title>ransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-06T070615.090.png</image:loc><image:caption>blogposttext20220906T070615090</image:caption><image:title>blogposttext20220906T070615090</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(2)-1.png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(28).png</image:loc><image:caption>blogposttext28</image:caption><image:title>blogposttext28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/XDR.png</image:loc><image:caption>XDR</image:caption><image:title>XDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(43).png</image:loc><image:caption>blogposttext43</image:caption><image:title>blogposttext43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(21)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews211</image:caption><image:title>CopyofBLOGSOCIALSETNews211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(31).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews31</image:caption><image:title>CopyofBLOGSOCIALSETNews31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(13).png</image:loc><image:caption>blogposttext13</image:caption><image:title>blogposttext13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-27T072602.816.png</image:loc><image:caption>blogposttext20220727T072602816</image:caption><image:title>blogposttext20220727T072602816</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template-2.png</image:loc><image:caption>CybereasonBlogTemplate2</image:caption><image:title>CybereasonBlogTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/publicsector.png</image:loc><image:caption>publicsector</image:caption><image:title>publicsector</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(46).png</image:loc><image:caption>blogposttext46</image:caption><image:title>blogposttext46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(9).png</image:loc><image:caption>blogposttext9</image:caption><image:title>blogposttext9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10biggest.png</image:loc><image:caption>10biggest</image:caption><image:title>10biggest</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(63).png</image:loc><image:caption>blogposttext63</image:caption><image:title>blogposttext63</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(14).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews14</image:caption><image:title>CopyofBLOGSOCIALSETNews14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-18T125623.731.png</image:loc><image:caption>blogposttext20220718T125623731</image:caption><image:title>blogposttext20220718T125623731</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-05T080649.580.png</image:loc><image:caption>blogposttext20220705T080649580</image:caption><image:title>blogposttext20220705T080649580</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(37).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews37</image:caption><image:title>CopyofBLOGSOCIALSETNews37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(16).png</image:loc><image:caption>blogposttext16</image:caption><image:title>blogposttext16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(99).png</image:loc><image:caption>blogposttext99</image:caption><image:title>blogposttext99</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(30).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews30</image:caption><image:title>CopyofBLOGSOCIALSETNews30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T141451.987.png</image:loc><image:caption>blogposttext20220725T141451987</image:caption><image:title>blogposttext20220725T141451987</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14).png</image:loc><image:caption>CybereasonBlogTemplate14</image:caption><image:title>CybereasonBlogTemplate14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(54).png</image:loc><image:caption>blogposttext54</image:caption><image:title>blogposttext54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-19T122257.609.png</image:loc><image:caption>blogposttext20220919T122257609</image:caption><image:title>blogposttext20220919T122257609</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-03T064719.647.png</image:loc><image:caption>blogposttext20220803T064719647</image:caption><image:title>blogposttext20220803T064719647</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-02T094421.274.png</image:loc><image:caption>blogposttext20220602T094421274</image:caption><image:title>blogposttext20220602T094421274</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(73).png</image:loc><image:caption>blogposttext73</image:caption><image:title>blogposttext73</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(43).png</image:loc><image:caption>CybereasonBlogTemplate43</image:caption><image:title>CybereasonBlogTemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(85).png</image:loc><image:caption>blogposttext85</image:caption><image:title>blogposttext85</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(110).png</image:loc><image:caption>blogposttext110</image:caption><image:title>blogposttext110</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(27).png</image:loc><image:caption>blogposttext27</image:caption><image:title>blogposttext27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T072315.427.png</image:loc><image:caption>blogposttext20220913T072315427</image:caption><image:title>blogposttext20220913T072315427</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(76).png</image:loc><image:caption>blogposttext76</image:caption><image:title>blogposttext76</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113510.582.png</image:loc><image:caption>blogposttext20220920T113510582</image:caption><image:title>blogposttext20220920T113510582</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-05-25T060629.971.png</image:loc><image:caption>blogposttext20220525T060629971</image:caption><image:title>blogposttext20220525T060629971</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(20).png</image:loc><image:caption>blogposttext20</image:caption><image:title>blogposttext20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-14T093955.662.png</image:loc><image:caption>blogposttext20220614T093955662</image:caption><image:title>blogposttext20220614T093955662</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(42).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews42</image:caption><image:title>CopyofBLOGSOCIALSETNews42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(19)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews191</image:caption><image:title>CopyofBLOGSOCIALSETNews191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(90).png</image:loc><image:caption>blogposttext90</image:caption><image:title>blogposttext90</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(2).png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(36).png</image:loc><image:caption>blogposttext36</image:caption><image:title>blogposttext36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-11T064615.861.png</image:loc><image:caption>blogposttext20221011T064615861</image:caption><image:title>blogposttext20221011T064615861</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085148.693.png</image:loc><image:caption>blogposttext20221018T085148693</image:caption><image:title>blogposttext20221018T085148693</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(46).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews46</image:caption><image:title>CopyofBLOGSOCIALSETNews46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(61).png</image:loc><image:caption>blogposttext61</image:caption><image:title>blogposttext61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-3.png</image:loc><image:caption>CybereasonBlogTemplate43</image:caption><image:title>CybereasonBlogTemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-28T132844.159.png</image:loc><image:caption>blogposttext20220628T132844159</image:caption><image:title>blogposttext20220628T132844159</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR_XDR.png</image:loc><image:caption>EDRXDR</image:caption><image:title>EDRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(10).png</image:loc><image:caption>blogposttext10</image:caption><image:title>blogposttext10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(27).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews27</image:caption><image:title>CopyofBLOGSOCIALSETNews27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T070701.315.png</image:loc><image:caption>blogposttext20220830T070701315</image:caption><image:title>blogposttext20220830T070701315</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(20).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews20</image:caption><image:title>CopyofBLOGSOCIALSETNews20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(82).png</image:loc><image:caption>blogposttext82</image:caption><image:title>blogposttext82</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-1.png</image:loc><image:caption>CybereasonBlogTemplate201</image:caption><image:title>CybereasonBlogTemplate201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(72).png</image:loc><image:caption>blogposttext72</image:caption><image:title>blogposttext72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(17)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews171</image:caption><image:title>CopyofBLOGSOCIALSETNews171</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(11).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews11</image:caption><image:title>CopyofBLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T073659.457.png</image:loc><image:caption>blogposttext20220907T073659457</image:caption><image:title>blogposttext20220907T073659457</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(3).png</image:loc><image:caption>ImagefromiOS3</image:caption><image:title>ImagefromiOS3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(75).png</image:loc><image:caption>blogposttext75</image:caption><image:title>blogposttext75</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-02T070344.027.png</image:loc><image:caption>blogposttext20220802T070344027</image:caption><image:title>blogposttext20220802T070344027</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T134258.568.png</image:loc><image:caption>blogposttext20220627T134258568</image:caption><image:title>blogposttext20220627T134258568</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(40).png</image:loc><image:caption>CybereasonBlogTemplate40</image:caption><image:title>CybereasonBlogTemplate40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-12T072834.369-1.png</image:loc><image:caption>blogposttext20221012T0728343691</image:caption><image:title>blogposttext20221012T0728343691</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(2)-3.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews23</image:caption><image:title>CopyofBLOGSOCIALSETNews23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(38).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews38</image:caption><image:title>CopyofBLOGSOCIALSETNews38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(115).png</image:loc><image:caption>blogposttext115</image:caption><image:title>blogposttext115</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3XDR.png</image:loc><image:caption>3XDR</image:caption><image:title>3XDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(52).png</image:loc><image:caption>blogposttext52</image:caption><image:title>blogposttext52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-2.png</image:loc><image:caption>CybereasonBlogTemplate52</image:caption><image:title>CybereasonBlogTemplate52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-1.png</image:loc><image:caption>CybereasonBlogTemplate41</image:caption><image:title>CybereasonBlogTemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog_automatingR.png</image:loc><image:caption>blogautomatingR</image:caption><image:title>blogautomatingR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-13T051646.778.png</image:loc><image:caption>blogposttext20220713T051646778</image:caption><image:title>blogposttext20220713T051646778</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-20T064817.923.png</image:loc><image:caption>blogposttext20220720T064817923</image:caption><image:title>blogposttext20220720T064817923</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(39).png</image:loc><image:caption>CybereasonBlogTemplate39</image:caption><image:title>CybereasonBlogTemplate39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(1)-2.png</image:loc><image:caption>CybereasonBlogTemplate12</image:caption><image:title>CybereasonBlogTemplate12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130836.455.png</image:loc><image:caption>blogposttext20220926T130836455</image:caption><image:title>blogposttext20220926T130836455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(44).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews44</image:caption><image:title>CopyofBLOGSOCIALSETNews44</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(80).png</image:loc><image:caption>blogposttext80</image:caption><image:title>blogposttext80</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(15).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews15</image:caption><image:title>CopyofBLOGSOCIALSETNews15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template-1.png</image:loc><image:caption>CybereasonBlogTemplate1</image:caption><image:title>CybereasonBlogTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-06T123240.080.png</image:loc><image:caption>blogposttext20220706T123240080</image:caption><image:title>blogposttext20220706T123240080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-2.png</image:loc><image:caption>CybereasonBlogTemplate32</image:caption><image:title>CybereasonBlogTemplate32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(50).png</image:loc><image:caption>blogposttext50</image:caption><image:title>blogposttext50</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T112612.527.png</image:loc><image:caption>blogposttext20220913T112612527</image:caption><image:title>blogposttext20220913T112612527</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(39).png</image:loc><image:caption>blogposttext39</image:caption><image:title>blogposttext39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-1.png</image:loc><image:caption>CybereasonBlogTemplate151</image:caption><image:title>CybereasonBlogTemplate151</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/astaroth-malware-exploits-avast-antivirus-lolbins-to-steal-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-7.png</image:loc><image:caption>SCMagazine7</image:caption><image:title>SCMagazine7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2019-02-14</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-do-you-know-where-your-data-is</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/William%20Miaoulis.png</image:loc><image:caption>WilliamMiaoulis</image:caption><image:title>WilliamMiaoulis</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(6)-1.png</image:loc><image:caption>CISOStoriestemplate61</image:caption><image:title>CISOStoriestemplate61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-11-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-cooperative-ransomware-blackmatter-tests-bidens-critical-infrastructure-mandate</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict%20logo-3.png</image:loc><image:caption>Verdictlogo3</image:caption><image:title>Verdictlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-09-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/heartbleed-first-attacks-exploiting-bug-recorded</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/e_t.jpg</image:loc><image:caption>et</image:caption><image:title>et</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cyber-defenders-council-is-it-time-for-cybersecurity-regulation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(111).png</image:loc><image:caption>blogposttext111</image:caption><image:title>blogposttext111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-15T085736.357.png</image:loc><image:caption>blogposttext20220915T085736357</image:caption><image:title>blogposttext20220915T085736357</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Meridith%20Levinson.png</image:loc><image:caption>MeridithLevinson</image:caption><image:title>MeridithLevinson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T071527.904.png</image:loc><image:caption>blogposttext20221006T071527904</image:caption><image:title>blogposttext20221006T071527904</image:title></image:image><lastmod>2022-09-20</lastmod></url><url><loc>https://www.cybereason.com/blog/evaluating-xdr-solutions-caveat-emptor-buyer-beware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(2).png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(73).png</image:loc><image:caption>blogposttext73</image:caption><image:title>blogposttext73</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-3.png</image:loc><image:caption>CybereasonBlogTemplate43</image:caption><image:title>CybereasonBlogTemplate43</image:title></image:image><lastmod>2022-04-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uber-reveals-cover-up-of-hack-affecting-57m-riders-drivers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/US%20News%20&amp;%20World%20Report%20logo.png</image:loc><image:caption>USNewsWorldReportlogo</image:caption><image:title>USNewsWorldReportlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cso-sam-curry-discusses-the-ransomware-attack-on-colonial-pipeline-with-good-morning-america</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Good%20Morning%20America%20logo.png</image:loc><image:caption>GoodMorningAmericalogo</image:caption><image:title>GoodMorningAmericalogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-05-13</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-delivers-100-scores-in-2023-mitre-attck-evaluations-for-enterprise</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/mitre-23-all-categories.png</image:loc><image:caption>mitre23allcategories</image:caption><image:title>mitre23allcategories</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/maranda-hs.jpg</image:loc><image:caption>marandahs</image:caption><image:title>marandahs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202025-01-17%20at%203.25.26%20PM.png</image:loc><image:caption>Screenshot20250117at32526PM</image:caption><image:title>Screenshot20250117at32526PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/mitre-23-platform.png</image:loc><image:caption>mitre23platform</image:caption><image:title>mitre23platform</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/mitre-23-blog-visibility.png</image:loc><image:caption>mitre23blogvisibility</image:caption><image:title>mitre23blogvisibility</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/mitre-23-blog-protection.png</image:loc><image:caption>mitre23blogprotection</image:caption><image:title>mitre23blogprotection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-mitre-23-lp-featured-1.png</image:loc><image:caption>crmitre23lpfeatured1</image:caption><image:title>crmitre23lpfeatured1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/mitre-23-blog-detection.png</image:loc><image:caption>mitre23blogdetection</image:caption><image:title>mitre23blogdetection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-10-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/https/www.fifthdomain.com/dod/2019/02/13/what-the-pentagons-new-ai-strategy-means-for-cybersecurity/</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fifth%20Domain%20Logo-1.png</image:loc><image:caption>FifthDomainLogo1</image:caption><image:title>FifthDomainLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2019-02-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinese-hackers-stole-data-from-uk-mobile-phones-for-up-to-seven-years-in-one-of-the-worlds-biggest-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Daily%20Mail-1.jpg</image:loc><image:caption>DailyMail1</image:caption><image:title>DailyMail1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2019-07-01</lastmod></url><url><loc>https://www.cybereason.com/blog/why-all-telemetry-is-essential-for-xdr-performance</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-2.png</image:loc><image:caption>CybereasonBlogTemplate52</image:caption><image:title>CybereasonBlogTemplate52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(3).png</image:loc><image:caption>ImagefromiOS3</image:caption><image:title>ImagefromiOS3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(21)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews211</image:caption><image:title>CopyofBLOGSOCIALSETNews211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/terms/policies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><lastmod>2022-02-11</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-finalist-in-info-security-products-guides-global-excellence-awards</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-wow-corrupted-blood</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/29%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>29MALICIOUSLIFE1</image:caption><image:title>29MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-research-finds-organizations-unprepared-for-ransomware-attacks-on-weekends-and-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(23).png</image:loc><image:caption>CybereasonBlogTemplate23</image:caption><image:title>CybereasonBlogTemplate23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/a-brief-history-of-ransomware-evolution</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-05T080649.580.png</image:loc><image:caption>blogposttext20220705T080649580</image:caption><image:title>blogposttext20220705T080649580</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-27T072602.816.png</image:loc><image:caption>blogposttext20220727T072602816</image:caption><image:title>blogposttext20220727T072602816</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(1)-2.png</image:loc><image:caption>CybereasonBlogTemplate12</image:caption><image:title>CybereasonBlogTemplate12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><lastmod>2021-12-01</lastmod></url><url><loc>https://www.cybereason.com/blog/use-siem-soar-and-edr-together-to-improve-defenses-and-save-money</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-955010382.jpg</image:loc><image:caption>GettyImages955010382</image:caption><image:title>GettyImages955010382</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3)-2.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews32</image:caption><image:title>CopyofBLOGSOCIALSETNews32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/additional-hacking-tools-tied-to-north-korea-linked-group</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-2.png</image:loc><image:caption>Bankinfosecuritylogo2</image:caption><image:title>Bankinfosecuritylogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-11-16</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/associated-press-ransomware-for-the-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Associated%20Press%20logo-1.png</image:loc><image:caption>AssociatedPresslogo1</image:caption><image:title>AssociatedPresslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/blog/mac-os-x-pirrit-adware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/pirrit_feature.jpg</image:loc><image:caption>pirritfeature</image:caption><image:title>pirritfeature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/read-now-CTA-300x105-1.png</image:loc><image:caption>readnowCTA300x1051</image:caption><image:title>readnowCTA300x1051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/goot-loader-blog-featured.png</image:loc><image:caption>gootloaderblogfeatured</image:caption><image:title>gootloaderblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(88).png</image:loc><image:caption>blogposttext88</image:caption><image:title>blogposttext88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-hires-tim-britt-as-emea-channel-director</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/PCR.jpg</image:loc><image:caption>PCR</image:caption><image:title>PCR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-big-leak-of-hacking-tools-is-causing-a-bit-of-mayhem-right-now</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Business%20Insider%20logo.png</image:loc><image:caption>BusinessInsiderlogo</image:caption><image:title>BusinessInsiderlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcst-the-problem-with-passwords</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/77%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>77MALICIOUSLIFE</image:caption><image:title>77MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Troy_Hunt.jpg</image:loc><image:caption>TroyHunt</image:caption><image:title>TroyHunt</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(9).png</image:loc><image:caption>MaliciousLifeepisode9</image:caption><image:title>MaliciousLifeepisode9</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/softbanks-arm-to-include-cybereason-security-services-in-iot-hub</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Xconomy%20logo.png</image:loc><image:caption>Xconomylogo</image:caption><image:title>Xconomylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-11-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecurity-industry-braces-for-tighter-visa-rules-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Untitled-design-16.png</image:loc><image:caption>Untitleddesign16</image:caption><image:title>Untitleddesign16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-summer-ctf-challenge-overviews</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-part-1-analysis-blog-analysis-featured.png</image:loc><image:caption>cuckoospearpart1analysisbloganalysisfeatured</image:caption><image:title>cuckoospearpart1analysisbloganalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Product-Screen-A.jpg</image:loc><image:caption>ProductScreenA</image:caption><image:title>ProductScreenA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1).png</image:loc><image:caption>BLOGPOST1</image:caption><image:title>BLOGPOST1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jacob-berry-hs.jpeg</image:loc><image:caption>jacobberryhs</image:caption><image:title>jacobberryhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CTF-Castle-Hero-1.png</image:loc><image:caption>CTFCastleHero1</image:caption><image:title>CTFCastleHero1</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/resources/live-stream-gov-experts-on-securing-a-remote-workforce-implications-from-the-solarium-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-06-03</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-krebs-curry-and-cyber-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(15)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews151</image:caption><image:title>CopyofBLOGSOCIALSETNews151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Krebs%2c%20Curry%20and%20CS%20Social.png</image:loc><image:caption>KrebsCurryandCSSocial</image:caption><image:title>KrebsCurryandCSSocial</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-2.png</image:loc><image:caption>CybereasonBlogTemplate152</image:caption><image:title>CybereasonBlogTemplate152</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/krebs-curry-cybersecurity-card.png</image:loc><image:caption>krebscurrycybersecuritycard</image:caption><image:title>krebscurrycybersecuritycard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/china-linked-cyber-espionage-team-homes-in-on-hong-kong-government-orgs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-Oct-22-2022-02-44-21-22-AM.png</image:loc><image:caption>DarkReadinglogoOct22202202442122AM</image:caption><image:title>DarkReadinglogoOct22202202442122AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-10-22</lastmod></url><url><loc>https://www.cybereason.com/blog/un-breach-highlights-escalation-of-cyber-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(24).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews24</image:caption><image:title>CopyofBLOGSOCIALSETNews24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-09-09</lastmod></url><url><loc>https://www.cybereason.com/blog/nine-cybersecurity-predictions-for-2023</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(95).png</image:loc><image:caption>blogposttext95</image:caption><image:title>blogposttext95</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2023%20Cybersecurity%20Predictions.png</image:loc><image:caption>2023CybersecurityPredictions</image:caption><image:title>2023CybersecurityPredictions</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-12-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/as-go-the-candidates-so-goes-u.s.-cyber-policy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/is-xdr-the-next-silver-bullet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/allie-hex-hs.png</image:loc><image:caption>alliehexhs</image:caption><image:title>alliehexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/yonaton-hex-hs.png</image:loc><image:caption>yonatonhexhs</image:caption><image:title>yonatonhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/xdr-panel-above-below.png</image:loc><image:caption>xdrpanelabovebelow</image:caption><image:title>xdrpanelabovebelow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(9).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews9</image:caption><image:title>CopyofBLOGSOCIALSETNews9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(92).png</image:loc><image:caption>blogposttext92</image:caption><image:title>blogposttext92</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/mike-rothman-hex-hs.png</image:loc><image:caption>mikerothmanhexhs</image:caption><image:title>mikerothmanhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-outperforms-every-company-in-the-mitre-attck-evaluations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-02-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/do-you-have-an-incident-response-plan-in-place</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CSO.png</image:loc><image:caption>CSO</image:caption><image:title>CSO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-study-reveals-uae-firms-pay-multiple-ransom-demands</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CXO%20Middle%20East%20logo-2.jpg</image:loc><image:caption>CXOMiddleEastlogo2</image:caption><image:title>CXOMiddleEastlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2022-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/string-of-bay-state-cybersecurity-acquisitions-reflects-a-maturing-market</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Boston-Business-Journal.jpg</image:loc><image:caption>BostonBusinessJournal</image:caption><image:title>BostonBusinessJournal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-hackers-use-ransomware-to-hide-data-breaches-and-other-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/csoonline-logo-1.jpg</image:loc><image:caption>csoonlinelogo1</image:caption><image:title>csoonlinelogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2019-04-03</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-vishing-voice-scams</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(31).png</image:loc><image:caption>MaliciousLifeepisode31</image:caption><image:title>MaliciousLifeepisode31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Rachel-Tobac.jpg</image:loc><image:caption>RachelTobac</image:caption><image:title>RachelTobac</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(12).png</image:loc><image:caption>MaliciousLifeepisode12</image:caption><image:title>MaliciousLifeepisode12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><lastmod>2022-10-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iowa-caucus-disaster-hacking-not-suspected</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/boston-globe-logo-1.jpg</image:loc><image:caption>bostonglobelogo1</image:caption><image:title>bostonglobelogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-02-04</lastmod></url><url><loc>https://www.cybereason.com/blog/improving-soc-workflows-with-cybereason-role-based-incident-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/user%20l1%20user%20role.png</image:loc><image:caption>userl1userrole</image:caption><image:title>userl1userrole</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/subtenant.png</image:loc><image:caption>subtenant</image:caption><image:title>subtenant</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/role-based-incident-response.png</image:loc><image:caption>rolebasedincidentresponse</image:caption><image:title>rolebasedincidentresponse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T114247.790-1.png</image:loc><image:caption>blogposttext20220913T1142477901</image:caption><image:title>blogposttext20220913T1142477901</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(68).png</image:loc><image:caption>blogposttext68</image:caption><image:title>blogposttext68</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(112).png</image:loc><image:caption>blogposttext112</image:caption><image:title>blogposttext112</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/data%20and%20malops%20in%20subtenent.png</image:loc><image:caption>dataandmalopsinsubtenent</image:caption><image:title>dataandmalopsinsubtenent</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-launches-first-channel-program-as-it-preps-for-next-growth-phase</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CRN-Logo-800x392.png</image:loc><image:caption>CRNLogo800x392</image:caption><image:title>CRNLogo800x392</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/perspectives-on-maintaining-secure-business-continuity-a-guide</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yonaton-HS.png</image:loc><image:caption>YonatonHS</image:caption><image:title>YonatonHS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Amit-HS.png</image:loc><image:caption>AmitHS</image:caption><image:title>AmitHS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Remote_Workforce_Whitepaper_Header_2000x574.jpg</image:loc><image:caption>RemoteWorkforceWhitepaperHeader2000x574</image:caption><image:title>RemoteWorkforceWhitepaperHeader2000x574</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam-HS.png</image:loc><image:caption>SamHS</image:caption><image:title>SamHS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-shawn-carpenter-a-cyber-vigilante</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-12-20</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-july-14th-2022-ransomware-labs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(121).png</image:loc><image:caption>blogposttext121</image:caption><image:title>blogposttext121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T074703.175.png</image:loc><image:caption>blogposttext20220627T074703175</image:caption><image:title>blogposttext20220627T074703175</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/ken-westin-circle-hs.png</image:loc><image:caption>kenwestincirclehs</image:caption><image:title>kenwestincirclehs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-06-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/your-new-cso-might-be-a-learning-computer-that-loves-cats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/fox-business-logo1-800x1000.jpg</image:loc><image:caption>foxbusinesslogo1800x1000</image:caption><image:title>foxbusinesslogo1800x1000</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinas-microsoft-hack-russias-solarwinds-attack-threaten-to-overwhelm-u.s-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Insurance%20Journal%20logo.png</image:loc><image:caption>InsuranceJournallogo</image:caption><image:title>InsuranceJournallogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-03-10</lastmod></url><url><loc>https://www.cybereason.com/blog/extortionists-publish-data-stolen-from-two-healthcare-service-providers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/healthcare-data-extortion-blog-card.png</image:loc><image:caption>healthcaredataextortionblogcard</image:caption><image:title>healthcaredataextortionblogcard</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-report-outlines-concrete-steps-to-diversify-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Govtech%20logo.png</image:loc><image:caption>Govtechlogo</image:caption><image:title>Govtechlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-09-22</lastmod></url><url><loc>https://www.cybereason.com/blog/north-korea-is-unlikely-to-be-behind-the-wannacry-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/NORTHKOREAWANNACRY2.jpg</image:loc><image:caption>NORTHKOREAWANNACRY2</image:caption><image:title>NORTHKOREAWANNACRY2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/press/introducing-cybereason-xdr-powered-by-google-chronicle</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/use-behavioral-analysis-not-blacklisting-to-protect-against-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Behavioral-Intelligence-2.jpg</image:loc><image:caption>BehavioralIntelligence2</image:caption><image:title>BehavioralIntelligence2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-02-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-unveils-threat-detection-platform-offering</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/executive_biz.jpg</image:loc><image:caption>executivebiz</image:caption><image:title>executivebiz</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/6-of-the-best-malicious-life-cybersecurity-history-stories-from-2019</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-244-Card.png</image:loc><image:caption>MLEp244Card</image:caption><image:title>MLEp244Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Equifax-breach.jpg</image:loc><image:caption>Equifaxbreach</image:caption><image:title>Equifaxbreach</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How-is-spyware-legal.png</image:loc><image:caption>Howisspywarelegal</image:caption><image:title>Howisspywarelegal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Gozi.jpg</image:loc><image:caption>Gozi</image:caption><image:title>Gozi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Conficker.jpg</image:loc><image:caption>Conficker</image:caption><image:title>Conficker</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Marconi-Maskelyne-Affair.jpg</image:loc><image:caption>MarconiMaskelyneAffair</image:caption><image:title>MarconiMaskelyneAffair</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Best-ML_Eps-Featured-Image.jpg</image:loc><image:caption>BestMLEpsFeaturedImage</image:caption><image:title>BestMLEpsFeaturedImage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mt-Gox.jpg</image:loc><image:caption>MtGox</image:caption><image:title>MtGox</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/youve-been-hit-with-ransomware-next-steps-to-recovery</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/forbes-logo-10.gif</image:loc><image:caption>forbeslogo10</image:caption><image:title>forbeslogo10</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-owning-the-battlefield</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/destructive-attacks-banner.png</image:loc><image:caption>destructiveattacksbanner</image:caption><image:title>destructiveattacksbanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Black%20Basta%20Threat%20Alert.png</image:loc><image:caption>BlackBastaThreatAlert</image:caption><image:title>BlackBastaThreatAlert</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(3).png</image:loc><image:caption>Vs3</image:caption><image:title>Vs3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-07-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-announces-the-launch-of-a-new-partner-program-for-the-middle-east</loc><image:image><image:loc>https://www.cybereason.com/hubfs/index.png</image:loc><image:caption>index</image:caption><image:title>index</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-08-06</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-discovers-corporate-espionage-hacking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/iocs-vs-iobs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/iocs-vs-iobs-hero.png</image:loc><image:caption>iocsvsiobshero</image:caption><image:title>iocsvsiobshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(2).png</image:loc><image:caption>ImagefromiOS2</image:caption><image:title>ImagefromiOS2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/study-cybersecurity-professionals-taking-on-more-data-privacy-duties</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SearchSecurity_001.png</image:loc><image:caption>SearchSecurity001</image:caption><image:title>SearchSecurity001</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2019-04-03</lastmod></url><url><loc>https://www.cybereason.com/blog/conti-ransomware-gang-strikes-jeweler-to-the-stars</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware%20Which%20Industries%20Are%20Most%20Likely%20to%20Pay-1.png</image:loc><image:caption>RansomwareWhichIndustriesAreMostLikelytoPay1</image:caption><image:title>RansomwareWhichIndustriesAreMostLikelytoPay1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(114).png</image:loc><image:caption>blogposttext114</image:caption><image:title>blogposttext114</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(10)-1.png</image:loc><image:caption>CybereasonBlogTemplate101</image:caption><image:title>CybereasonBlogTemplate101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2021-11-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-north-korean-sideshow-and-why-the-missile-escalation-cycle-should-not-be-the-main-concern-of-western-cybersecurity-experts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-advances-prevention-data-collection-investigation-and-management-capabilities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20advances%20prevention%20data%20collection.png</image:loc><image:caption>Cybereasonadvancespreventiondatacollection</image:caption><image:title>Cybereasonadvancespreventiondatacollection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/justin-hs-hex.png</image:loc><image:caption>justinhshex</image:caption><image:title>justinhshex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2023-02-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/petya/notpetya-what-we-know-in-the-first-24-hours</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-detection-making-the-complicated-simple-again</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/epp-changing-of-the-guard-blog-featured.png</image:loc><image:caption>eppchangingoftheguardblogfeatured</image:caption><image:title>eppchangingoftheguardblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(37)-1.png</image:loc><image:caption>blogposttext371</image:caption><image:title>blogposttext371</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Cybersecurity-Capability-Industry-Nearly-Forgot.png</image:loc><image:caption>CybersecurityCapabilityIndustryNearlyForgot</image:caption><image:title>CybersecurityCapabilityIndustryNearlyForgot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-07-08</lastmod></url><url><loc>https://www.cybereason.com/blog/the-dawn-of-sophisticated-powershell-adware-campaigns</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/dawn-of-powershell-blog-banner-1-1024x300.jpg</image:loc><image:caption>dawnofpowershellblogbanner11024x300</image:caption><image:title>dawnofpowershellblogbanner11024x300</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Yana%20Blachman.jpg</image:loc><image:caption>YanaBlachman</image:caption><image:title>YanaBlachman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/brazilian-made-bank-trojan-use-spreading</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-6.png</image:loc><image:caption>SCMagazine6</image:caption><image:title>SCMagazine6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-12-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/51-enterprise-startups-to-bet-your-career-on-in-2018</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Business%20Insider%20logo.png</image:loc><image:caption>BusinessInsiderlogo</image:caption><image:title>BusinessInsiderlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/platform/xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xdr-page-featured-image.png</image:loc><image:caption>xdrpagefeaturedimage</image:caption><image:title>xdrpagefeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/endpoint-logo.png</image:loc><image:caption>endpointlogo</image:caption><image:title>endpointlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/network_logo.png</image:loc><image:caption>networklogo</image:caption><image:title>networklogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cloud_logos.png</image:loc><image:caption>cloudlogos</image:caption><image:title>cloudlogos</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/xdr-product-brief-cover.png</image:loc><image:caption>xdrproductbriefcover</image:caption><image:title>xdrproductbriefcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/mitre-2023-resource-card.png</image:loc><image:caption>mitre2023resourcecard</image:caption><image:title>mitre2023resourcecard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/andreas-quote.png</image:loc><image:caption>andreasquote</image:caption><image:title>andreasquote</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/workspace_logo.png</image:loc><image:caption>workspacelogo</image:caption><image:title>workspacelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Customer%20Logos/XDR%20Malop.png</image:loc><image:caption>XDRMalop</image:caption><image:title>XDRMalop</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-dkgray-05.png</image:loc><image:caption>crbgsubtledkgray05</image:caption><image:title>crbgsubtledkgray05</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--platform-02-gradient.jpg</image:loc><image:caption>crbgheroplatform02gradient</image:caption><image:title>crbgheroplatform02gradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Customer%20Logos/XDR%20Dashboard.png</image:loc><image:caption>XDRDashboard</image:caption><image:title>XDRDashboard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/identity_logo.png</image:loc><image:caption>identitylogo</image:caption><image:title>identitylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/7-reqs-xdr-strat-blog-card.png</image:loc><image:caption>7reqsxdrstratblogcard</image:caption><image:title>7reqsxdrstratblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Customer%20Logos/Cybereason%20Connect%20.png</image:loc><image:caption>CybereasonConnect</image:caption><image:title>CybereasonConnect</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-icon--black.svg</image:loc><image:caption>crlogoiconblack</image:caption><image:title>crlogoiconblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/malop-infographic-cover.png</image:loc><image:caption>malopinfographiccover</image:caption><image:title>malopinfographiccover</image:title></image:image><lastmod>2024-01-10</lastmod></url><url><loc>https://www.cybereason.com/consulting/pixel-tracking-privacy-assessment</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-yellow-divider-line.png</image:loc><image:caption>cybereasonyellowdividerline</image:caption><image:title>cybereasonyellowdividerline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(36).png</image:loc><image:caption>BLOGImagesTemplatev236</image:caption><image:title>BLOGImagesTemplatev236</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PROACTIVE_THREATHUNTING_CR_ICONS-25.svg</image:loc><image:caption>PROACTIVETHREATHUNTINGCRICONS25</image:caption><image:title>PROACTIVETHREATHUNTINGCRICONS25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-protector-hero-with-hex-bg-v2.png</image:loc><image:caption>crprotectorherowithhexbgv2</image:caption><image:title>crprotectorherowithhexbgv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-preventid-flipped.png</image:loc><image:caption>crowlshowcasepreventidflipped</image:caption><image:title>crowlshowcasepreventidflipped</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR2_CR_ICONS-11.png</image:loc><image:caption>EDR2CRICONS11</image:caption><image:title>EDR2CRICONS11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/michael-quinn.webp</image:loc><image:caption>michaelquinn</image:caption><image:title>michaelquinn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Mitre%20Blog%202026.png</image:loc><image:caption>CybereasonMitreBlog2026</image:caption><image:title>CybereasonMitreBlog2026</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-hero-protector-min.png</image:loc><image:caption>crheroprotectormin</image:caption><image:title>crheroprotectormin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ben-demonte.jpg</image:loc><image:caption>bendemonte</image:caption><image:title>bendemonte</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-spine-bg--endpoint-protection-clean-d.jpg</image:loc><image:caption>crplatformspinebgendpointprotectioncleand</image:caption><image:title>crplatformspinebgendpointprotectioncleand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-gen-feat-img-web.png</image:loc><image:caption>cybereasongenfeatimgweb</image:caption><image:title>cybereasongenfeatimgweb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/derek-rieck.png</image:loc><image:caption>derekrieck</image:caption><image:title>derekrieck</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/denman-headshot.png</image:loc><image:caption>denmanheadshot</image:caption><image:title>denmanheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DurrantProfilePic2025.png</image:loc><image:caption>DurrantProfilePic2025</image:caption><image:title>DurrantProfilePic2025</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ATTACK_GOAL_CR_ICONS-33.svg</image:loc><image:caption>ATTACKGOALCRICONS33</image:caption><image:title>ATTACKGOALCRICONS33</image:title></image:image><lastmod>2025-03-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ten-of-the-fastest-growing-tech-companies-based-on-social-media-and-web-presence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Boston-Business-Journal.jpg</image:loc><image:caption>BostonBusinessJournal</image:caption><image:title>BostonBusinessJournal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/deep-dive-into-ragnar-locker-ransomware-targeting-critical-industries</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-Sep-01-2022-08-35-04-81-PM.jpg</image:loc><image:caption>SecurityWeeklogoSep01202208350481PM</image:caption><image:title>SecurityWeeklogoSep01202208350481PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2022-09-01</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-hacker-highschool</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ML146_2.png</image:loc><image:caption>ML1462</image:caption><image:title>ML1462</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pete_herzog.jpg</image:loc><image:caption>peteherzog</image:caption><image:title>peteherzog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(9).png</image:loc><image:caption>MaliciousLifeepisode9</image:caption><image:title>MaliciousLifeepisode9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-01-24</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-the-current-state-and-future-challenges-of-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3)-2.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews32</image:caption><image:title>CopyofBLOGSOCIALSETNews32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ed%20Amoroso.jpg</image:loc><image:caption>EdAmoroso</image:caption><image:title>EdAmoroso</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20%20SOCIAL%20SET.png</image:loc><image:caption>BLOGSOCIALSET</image:caption><image:title>BLOGSOCIALSET</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-29T100914.455.png</image:loc><image:caption>blogposttext20220929T100914455</image:caption><image:title>blogposttext20220929T100914455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-1.jpg</image:loc><image:caption>SamCurry1</image:caption><image:title>SamCurry1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-04-28</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-russia-ukraine-cyberwar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(26)-2.png</image:loc><image:caption>CybereasonBlogTemplate262</image:caption><image:title>CybereasonBlogTemplate262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Lior-2.png</image:loc><image:caption>Lior2</image:caption><image:title>Lior2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/yonatan-cropped-hexagon.png</image:loc><image:caption>yonatancroppedhexagon</image:caption><image:title>yonatancroppedhexagon</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam-1.png</image:loc><image:caption>Sam1</image:caption><image:title>Sam1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(3).png</image:loc><image:caption>MaliciousLifeTemplate3</image:caption><image:title>MaliciousLifeTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4).png</image:loc><image:caption>MaliciousLifeepisode4</image:caption><image:title>MaliciousLifeepisode4</image:title></image:image><lastmod>2022-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-decss-hackers-vs-hollywood</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/43%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>43MALICIOUSLIFE</image:caption><image:title>43MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/placeholder-headshot-image.jpg</image:loc><image:caption>placeholderheadshotimage</image:caption><image:title>placeholderheadshotimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5).png</image:loc><image:caption>MaliciousLifeepisode5</image:caption><image:title>MaliciousLifeepisode5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/tech-companies-weigh-responses-to-wikileaks-exposure</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CIO-Today2.png</image:loc><image:caption>CIOToday2</image:caption><image:title>CIOToday2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/bumblebee-loader-use-for-network-breaches-on-the-rise</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Aug-24-2022-12-00-48-90-AM.png</image:loc><image:caption>SCMagazinelogoAug24202212004890AM</image:caption><image:title>SCMagazinelogoAug24202212004890AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-08-24</lastmod></url><url><loc>https://www.cybereason.com/blog/4-challenges-faced-by-organizations-transitioning-to-remote-work</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(50).png</image:loc><image:caption>blogposttext50</image:caption><image:title>blogposttext50</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sean-mooney-hs.jpg</image:loc><image:caption>seanmooneyhs</image:caption><image:title>seanmooneyhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(115).png</image:loc><image:caption>blogposttext115</image:caption><image:title>blogposttext115</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WFH-Remote-Security-Blog.png</image:loc><image:caption>WFHRemoteSecurityBlog</image:caption><image:title>WFHRemoteSecurityBlog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-08-26</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-ashley-madison-hack-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/steve%20ragan.jpg</image:loc><image:caption>steveragan</image:caption><image:title>steveragan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/31%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>31MALICIOUSLIFE</image:caption><image:title>31MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomfree-product-review</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/techradar_logo_800x450.jpg</image:loc><image:caption>techradarlogo800x450</image:caption><image:title>techradarlogo800x450</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/how-ransomware-is-driving-soc-modernization-requirements</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20MDR%20fast%20efficient%20effective.png</image:loc><image:caption>cybereasonMDRfastefficienteffective</image:caption><image:title>cybereasonMDRfastefficienteffective</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20Ransomware%20is%20Driving%20SOC%20Modernization%20Requirements.png</image:loc><image:caption>HowRansomwareisDrivingSOCModernizationRequirements</image:caption><image:title>HowRansomwareisDrivingSOCModernizationRequirements</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T125306.964.png</image:loc><image:caption>blogposttext20221003T125306964</image:caption><image:title>blogposttext20221003T125306964</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware_and_the_Modern%20SOC_2023.png</image:loc><image:caption>RansomwareandtheModernSOC2023</image:caption><image:title>RansomwareandtheModernSOC2023</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2023-03-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/dont-depend-on-just-one-program-to-protect-your-computer-from-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Arizona-Republic.png</image:loc><image:caption>ArizonaRepublic</image:caption><image:title>ArizonaRepublic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyberattacks-on-athletes-may-be-russian-distraction-tactic</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/technews.jpg</image:loc><image:caption>technews</image:caption><image:title>technews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-payback-virus</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-1.png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-4.png</image:loc><image:caption>image124</image:caption><image:title>image124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-245-Card.png</image:loc><image:caption>MLEp245Card</image:caption><image:title>MLEp245Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><lastmod>2018-07-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/profile-of-cybereasons-mor-levi</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tahawul%20Tech%20logo-4.jpg</image:loc><image:caption>TahawulTechlogo4</image:caption><image:title>TahawulTechlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-04-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-many-ways-a-ransomware-attack-can-hurt-your-organization</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo-4.png</image:loc><image:caption>TechRepubliclogo4</image:caption><image:title>TechRepubliclogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-exabeam-announce-partnership</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-20</lastmod></url><url><loc>https://www.cybereason.com/press-releases</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-02-12</lastmod></url><url><loc>https://www.cybereason.com/blog/need-a-boost-stretch-your-skills-with-the-cybereason-summer-ctf</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/lockpick-kit.png</image:loc><image:caption>lockpickkit</image:caption><image:title>lockpickkit</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/rubber_ducky_2000x.jpg</image:loc><image:caption>rubberducky2000x</image:caption><image:title>rubberducky2000x</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eric-sun-hs.jpg</image:loc><image:caption>ericsunhs</image:caption><image:title>ericsunhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CTF-Blog-Announcement.jpg</image:loc><image:caption>CTFBlogAnnouncement</image:caption><image:title>CTFBlogAnnouncement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bashbunny_2_2000x.png</image:loc><image:caption>bashbunny22000x</image:caption><image:title>bashbunny22000x</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-07-22</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-election-hacking-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/91%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>91MALICIOUSLIFE</image:caption><image:title>91MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/rising-from-the-coding-ranks-to-become-a-cto</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Infoworld-1.png</image:loc><image:caption>Infoworld1</image:caption><image:title>Infoworld1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-government-issues-thanksgiving-ransomware-warning</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNN%20logo-Dec-02-2021-01-49-31-37-AM.png</image:loc><image:caption>CNNlogoDec02202101493137AM</image:caption><image:title>CNNlogoDec02202101493137AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-cyderes-announce-a-partnership-to-bring-a-managed-detection-response-solution-to-market</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-07-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-recovery-can-be-costly-and-not-just-because-of-the-ransom</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechCrunch%20logo-Aug-19-2021-01-06-46-45-AM.png</image:loc><image:caption>TechCrunchlogoAug19202101064645AM</image:caption><image:title>TechCrunchlogoAug19202101064645AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-08-19</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs.-prometheus-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template%20(2).png</image:loc><image:caption>CybereasonVsTemplate2</image:caption><image:title>CybereasonVsTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/blog/soc-modernization-where-are-you-on-the-evolutionary-journey</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T134705.705.png</image:loc><image:caption>blogposttext20220627T134705705</image:caption><image:title>blogposttext20220627T134705705</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/soc-modernization-blog-featured.png</image:loc><image:caption>socmodernizationblogfeatured</image:caption><image:title>socmodernizationblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/2024-Cybersecurity-Predictions%20-%20Generative-GD-Featured.png</image:loc><image:caption>2024CybersecurityPredictionsGenerativeGDFeatured</image:caption><image:title>2024CybersecurityPredictionsGenerativeGDFeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-09-23</lastmod></url><url><loc>https://www.cybereason.com/consulting/experts/denman-powers</loc><lastmod>2025-08-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/telcos-around-the-world-hit-by-long-term-intelligence-gathering-cyberattack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/csoonline-logo-2.jpg</image:loc><image:caption>csoonlinelogo2</image:caption><image:title>csoonlinelogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-story-of-l0pht-p2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/105%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>105MALICIOUSLIFE</image:caption><image:title>105MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(3).png</image:loc><image:caption>Maliciouslifepodcast3</image:caption><image:title>Maliciouslifepodcast3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/chris%20wysopal.png</image:loc><image:caption>chriswysopal</image:caption><image:title>chriswysopal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iranian-hackers-are-going-after-a-disturbing-new-physical-target</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/forbes-logo-8.gif</image:loc><image:caption>forbeslogo8</image:caption><image:title>forbeslogo8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/limor-wainstein</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/limor-author.png</image:loc><image:caption>limorauthor</image:caption><image:title>limorauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/exploit-protection-blog-card.png</image:loc><image:caption>exploitprotectionblogcard</image:caption><image:title>exploitprotectionblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Symantec_LandingPage_Banner-8.png</image:loc><image:caption>SymantecLandingPageBanner8</image:caption><image:title>SymantecLandingPageBanner8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/autonomous-cyber-defences-are-the-future</loc><image:image><image:loc>https://www.cybereason.com/hubfs/zdnet-logo-large.png</image:loc><image:caption>zdnetlogolarge</image:caption><image:title>zdnetlogolarge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-12-03</lastmod></url><url><loc>https://www.cybereason.com/blog/what-microsofts-tay-twitter-bot-teaches-us-about-machine-learning</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blank-avatar.png</image:loc><image:caption>blankavatar</image:caption><image:title>blankavatar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(17)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews171</image:caption><image:title>CopyofBLOGSOCIALSETNews171</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(3).png</image:loc><image:caption>CybereasonBlogtemplate3</image:caption><image:title>CybereasonBlogtemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-report-plugx-rat-loader-evolution</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Sep-07-2022-04-27-03-92-PM.png</image:loc><image:caption>CaptureSep07202204270392PM</image:caption><image:title>CaptureSep07202204270392PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Sep-07-2022-06-31-03-04-PM.png</image:loc><image:caption>image9Sep07202206310304PM</image:caption><image:title>image9Sep07202206310304PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Sep-07-2022-04-35-13-85-PM.png</image:loc><image:caption>CaptureSep07202204351385PM</image:caption><image:title>CaptureSep07202204351385PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Sep-07-2022-04-37-30-53-PM.png</image:loc><image:caption>CaptureSep07202204373053PM</image:caption><image:title>CaptureSep07202204373053PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Sep-07-2022-04-30-46-72-PM.png</image:loc><image:caption>CaptureSep07202204304672PM</image:caption><image:title>CaptureSep07202204304672PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T090944.782.png</image:loc><image:caption>blogposttext20220907T090944782</image:caption><image:title>blogposttext20220907T090944782</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Sep-07-2022-06-37-42-85-PM.png</image:loc><image:caption>image13Sep07202206374285PM</image:caption><image:title>image13Sep07202206374285PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Sep-07-2022-04-58-00-00-PM.png</image:loc><image:caption>CaptureSep07202204580000PM</image:caption><image:title>CaptureSep07202204580000PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Sep-07-2022-06-34-40-21-PM.png</image:loc><image:caption>image15Sep07202206344021PM</image:caption><image:title>image15Sep07202206344021PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Sep-07-2022-06-39-00-35-PM.png</image:loc><image:caption>image2Sep07202206390035PM</image:caption><image:title>image2Sep07202206390035PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T115923.524.png</image:loc><image:caption>blogposttext20220815T115923524</image:caption><image:title>blogposttext20220815T115923524</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Sep-07-2022-06-38-32-20-PM.png</image:loc><image:caption>image16Sep07202206383220PM</image:caption><image:title>image16Sep07202206383220PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Sep-07-2022-06-34-01-70-PM.png</image:loc><image:caption>image10Sep07202206340170PM</image:caption><image:title>image10Sep07202206340170PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Sep-07-2022-05-20-17-67-PM.png</image:loc><image:caption>CaptureSep07202205201767PM</image:caption><image:title>CaptureSep07202205201767PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Sep-07-2022-06-39-56-99-PM.png</image:loc><image:caption>image8Sep07202206395699PM</image:caption><image:title>image8Sep07202206395699PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(125).png</image:loc><image:caption>blogposttext125</image:caption><image:title>blogposttext125</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Sep-07-2022-04-33-34-21-PM.png</image:loc><image:caption>CaptureSep07202204333421PM</image:caption><image:title>CaptureSep07202204333421PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Sep-07-2022-06-40-39-71-PM.png</image:loc><image:caption>image5Sep07202206403971PM</image:caption><image:title>image5Sep07202206403971PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Sep-07-2022-06-40-57-90-PM.png</image:loc><image:caption>image4Sep07202206405790PM</image:caption><image:title>image4Sep07202206405790PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Sep-07-2022-06-31-36-78-PM.png</image:loc><image:caption>image6Sep07202206313678PM</image:caption><image:title>image6Sep07202206313678PM</image:title></image:image><lastmod>2022-09-09</lastmod></url><url><loc>https://www.cybereason.com/blog/ai-driven-xdr-defeating-the-most-complex-attack-sequences</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(82).png</image:loc><image:caption>blogposttext82</image:caption><image:title>blogposttext82</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(52).png</image:loc><image:caption>blogposttext52</image:caption><image:title>blogposttext52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-28T132844.159.png</image:loc><image:caption>blogposttext20220628T132844159</image:caption><image:title>blogposttext20220628T132844159</image:title></image:image><lastmod>2022-03-25</lastmod></url><url><loc>https://www.cybereason.com/blog/getting-a-technology-gadget-as-a-holiday-gift-dont-forget-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(77).png</image:loc><image:caption>blogposttext77</image:caption><image:title>blogposttext77</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/defending-against-supply-chain-and-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-02T070344.027.png</image:loc><image:caption>blogposttext20220802T070344027</image:caption><image:title>blogposttext20220802T070344027</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(14).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews14</image:caption><image:title>CopyofBLOGSOCIALSETNews14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130836.455.png</image:loc><image:caption>blogposttext20220926T130836455</image:caption><image:title>blogposttext20220926T130836455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-09-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-intel-partner-for-hardware-enabled-ransomware-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo.png</image:loc><image:caption>MSSPAlertlogo</image:caption><image:title>MSSPAlertlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-01-13</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-labmd-vs.-ftc</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Podcast%20LabMD%20vs%20FTC.png</image:loc><image:caption>MaliciousLifePodcastLabMDvsFTC</image:caption><image:title>MaliciousLifePodcastLabMDvsFTC</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/blog/international-womens-day-win-as-one-takes-true-commitment-to-diversity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/IWD%20blog%20Dani%20wood%20.png</image:loc><image:caption>IWDblogDaniwood</image:caption><image:title>IWDblogDaniwood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dani-wood.png</image:loc><image:caption>daniwood</image:caption><image:title>daniwood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Future%20SOC%20Effectiveness.png</image:loc><image:caption>FutureSOCEffectiveness</image:caption><image:title>FutureSOCEffectiveness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/apple-supplier-quanta-hit-with-50-million-ransomware-attack-from-revil</loc><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo-3.png</image:loc><image:caption>TechRepubliclogo3</image:caption><image:title>TechRepubliclogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/product/cybereason-xdr-intelligence-driven-hunting</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10XThreat.png</image:loc><image:caption>10XThreat</image:caption><image:title>10XThreat</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/7-requirements-for-xdr.png</image:loc><image:caption>7requirementsforxdr</image:caption><image:title>7requirementsforxdr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(41).png</image:loc><image:caption>blogposttext41</image:caption><image:title>blogposttext41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-report-lockbit-2.0-all-paths-lead-to-ransom</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Jul-06-2022-08-43-32-29-PM.png</image:loc><image:caption>image10Jul06202208433229PM</image:caption><image:title>image10Jul06202208433229PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image26-Jul-06-2022-08-44-24-12-PM.png</image:loc><image:caption>image26Jul06202208442412PM</image:caption><image:title>image26Jul06202208442412PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image31-Jul-06-2022-08-51-38-33-PM.png</image:loc><image:caption>image31Jul06202208513833PM</image:caption><image:title>image31Jul06202208513833PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Jul-06-2022-08-57-23-32-PM.png</image:loc><image:caption>image9Jul06202208572332PM</image:caption><image:title>image9Jul06202208572332PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-Jul-06-2022-08-24-45-11-PM.png</image:loc><image:caption>image19Jul06202208244511PM</image:caption><image:title>image19Jul06202208244511PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-Jul-06-2022-08-25-51-75-PM.png</image:loc><image:caption>image21Jul06202208255175PM</image:caption><image:title>image21Jul06202208255175PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image39-3.png</image:loc><image:caption>image393</image:caption><image:title>image393</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image44-3.png</image:loc><image:caption>image443</image:caption><image:title>image443</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-Jul-06-2022-08-28-00-60-PM.png</image:loc><image:caption>image20Jul06202208280060PM</image:caption><image:title>image20Jul06202208280060PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image34-Jul-06-2022-08-48-22-34-PM.png</image:loc><image:caption>image34Jul06202208482234PM</image:caption><image:title>image34Jul06202208482234PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image43-4.png</image:loc><image:caption>image434</image:caption><image:title>image434</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image41-4.png</image:loc><image:caption>image414</image:caption><image:title>image414</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27-1.jpg</image:loc><image:caption>image271</image:caption><image:title>image271</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image29-Jul-06-2022-08-38-14-39-PM.png</image:loc><image:caption>image29Jul06202208381439PM</image:caption><image:title>image29Jul06202208381439PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-Jul-06-2022-08-16-20-48-PM.png</image:loc><image:caption>image24Jul06202208162048PM</image:caption><image:title>image24Jul06202208162048PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T071524.894.png</image:loc><image:caption>blogposttext20220707T071524894</image:caption><image:title>blogposttext20220707T071524894</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Jul-06-2022-08-28-55-72-PM.png</image:loc><image:caption>image16Jul06202208285572PM</image:caption><image:title>image16Jul06202208285572PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Jul-06-2022-08-48-58-45-PM.png</image:loc><image:caption>image14Jul06202208485845PM</image:caption><image:title>image14Jul06202208485845PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Jul-06-2022-08-17-56-59-PM.png</image:loc><image:caption>image13Jul06202208175659PM</image:caption><image:title>image13Jul06202208175659PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image32-Jul-06-2022-08-50-44-56-PM.png</image:loc><image:caption>image32Jul06202208504456PM</image:caption><image:title>image32Jul06202208504456PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image28-Jul-06-2022-08-46-38-99-PM.png</image:loc><image:caption>image28Jul06202208463899PM</image:caption><image:title>image28Jul06202208463899PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-Jul-06-2022-08-22-22-11-PM.png</image:loc><image:caption>image17Jul06202208222211PM</image:caption><image:title>image17Jul06202208222211PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image25-Jul-06-2022-08-45-36-76-PM.png</image:loc><image:caption>image25Jul06202208453676PM</image:caption><image:title>image25Jul06202208453676PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image38-3.png</image:loc><image:caption>image383</image:caption><image:title>image383</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image35-Jul-06-2022-08-41-05-37-PM.png</image:loc><image:caption>image35Jul06202208410537PM</image:caption><image:title>image35Jul06202208410537PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image33-Jul-06-2022-08-32-08-30-PM.png</image:loc><image:caption>image33Jul06202208320830PM</image:caption><image:title>image33Jul06202208320830PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Jul-06-2022-08-58-13-42-PM.png</image:loc><image:caption>image12Jul06202208581342PM</image:caption><image:title>image12Jul06202208581342PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image37-4.png</image:loc><image:caption>image374</image:caption><image:title>image374</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Jul-06-2022-08-29-57-36-PM.png</image:loc><image:caption>image15Jul06202208295736PM</image:caption><image:title>image15Jul06202208295736PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image45-3.png</image:loc><image:caption>image453</image:caption><image:title>image453</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image42-3.png</image:loc><image:caption>image423</image:caption><image:title>image423</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image40-4.png</image:loc><image:caption>image404</image:caption><image:title>image404</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-Jul-06-2022-08-10-09-61-PM.png</image:loc><image:caption>image23Jul06202208100961PM</image:caption><image:title>image23Jul06202208100961PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Jul-06-2022-08-19-03-08-PM.png</image:loc><image:caption>image1Jul06202208190308PM</image:caption><image:title>image1Jul06202208190308PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image22-Jul-06-2022-08-34-41-08-PM.png</image:loc><image:caption>image22Jul06202208344108PM</image:caption><image:title>image22Jul06202208344108PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Jul-06-2022-08-53-05-10-PM.png</image:loc><image:caption>image11Jul06202208530510PM</image:caption><image:title>image11Jul06202208530510PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Jul-06-2022-08-19-47-52-PM.png</image:loc><image:caption>image2Jul06202208194752PM</image:caption><image:title>image2Jul06202208194752PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image30-Jul-06-2022-08-41-44-88-PM.png</image:loc><image:caption>image30Jul06202208414488PM</image:caption><image:title>image30Jul06202208414488PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image46.jpg</image:loc><image:caption>image46</image:caption><image:title>image46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Jul-06-2022-08-33-51-09-PM.png</image:loc><image:caption>image3Jul06202208335109PM</image:caption><image:title>image3Jul06202208335109PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-Jul-06-2022-08-39-24-35-PM.png</image:loc><image:caption>image18Jul06202208392435PM</image:caption><image:title>image18Jul06202208392435PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Jul-06-2022-08-15-06-39-PM.png</image:loc><image:caption>image4Jul06202208150639PM</image:caption><image:title>image4Jul06202208150639PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Jul-06-2022-08-24-11-53-PM.png</image:loc><image:caption>image6Jul06202208241153PM</image:caption><image:title>image6Jul06202208241153PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Jul-06-2022-08-36-00-34-PM.png</image:loc><image:caption>image5Jul06202208360034PM</image:caption><image:title>image5Jul06202208360034PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image36-Jul-06-2022-08-40-20-66-PM.png</image:loc><image:caption>image36Jul06202208402066PM</image:caption><image:title>image36Jul06202208402066PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Jul-06-2022-08-20-43-75-PM.png</image:loc><image:caption>image7Jul06202208204375PM</image:caption><image:title>image7Jul06202208204375PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Jul-06-2022-08-36-58-92-PM.png</image:loc><image:caption>image8Jul06202208365892PM</image:caption><image:title>image8Jul06202208365892PM</image:title></image:image><lastmod>2022-07-07</lastmod></url><url><loc>https://www.cybereason.com/blog/the-u.k.-cyber-strategy-and-minimizing-the-impact-of-cybersecurity-incidents</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94)-1.png</image:loc><image:caption>blogposttext941</image:caption><image:title>blogposttext941</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(64).png</image:loc><image:caption>blogposttext64</image:caption><image:title>blogposttext64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(91).png</image:loc><image:caption>blogposttext91</image:caption><image:title>blogposttext91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8994.jpg</image:loc><image:caption>IMG8994</image:caption><image:title>IMG8994</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-04-28</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-an-idc-innovator-for-artificial-intelligence-infused-security-solutions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/raccoon-malware-scavenges-100000-devices-to-steal-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Post.png</image:loc><image:caption>ThreatPost</image:caption><image:title>ThreatPost</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2019-11-05</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-detects-and-stops-notpetya-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/ransomfree.jpg</image:loc><image:caption>ransomfree</image:caption><image:title>ransomfree</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/new-ebook-the-seven-struggles-of-detection-and-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Blog-Post_Seven-Signs_Thumb2.jpg</image:loc><image:caption>BlogPostSevenSignsThumb2</image:caption><image:title>BlogPostSevenSignsThumb2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(23).png</image:loc><image:caption>CybereasonBlogTemplate23</image:caption><image:title>CybereasonBlogTemplate23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/paypal-gets-stuffed-by-large-scale-credential-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Beta%20News%20logo-Jan-23-2023-06-29-56-5334-PM.png</image:loc><image:caption>BetaNewslogoJan2320230629565334PM</image:caption><image:title>BetaNewslogoJan2320230629565334PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2023-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/which-companies-could-ipo-in-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20Finance%20logo-1.png</image:loc><image:caption>YahooFinancelogo1</image:caption><image:title>YahooFinancelogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/gaza-group-strikes-targets-in-palestinian-territories-in-new-cyberattack-wave</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zdnet-5.png</image:loc><image:caption>zdnet5</image:caption><image:title>zdnet5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-02-13</lastmod></url><url><loc>https://www.cybereason.com/blog/a-note-of-support-to-our-customers-during-the-covid-19-pandemic</loc><image:image><image:loc>https://www.cybereason.com/hubfs/bhanucropped-193332-edited.jpg</image:loc><image:caption>bhanucropped193332edited</image:caption><image:title>bhanucropped193332edited</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/protecting-banking-industry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/floriane-vita-88722.jpg</image:loc><image:caption>florianevita88722</image:caption><image:title>florianevita88722</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/video-background.jpg</image:loc><image:caption>videobackground</image:caption><image:title>videobackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/platform-bg-shape-sm.png</image:loc><image:caption>platformbgshapesm</image:caption><image:title>platformbgshapesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/full-background.png</image:loc><image:caption>fullbackground</image:caption><image:title>fullbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gray-bg.jpg</image:loc><image:caption>graybg</image:caption><image:title>graybg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/play%20button.png</image:loc><image:caption>playbutton</image:caption><image:title>playbutton</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-threat-hunting-101-you-asked-we-answered</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CybereasonBlogHeroTemplate</image:caption><image:title>CybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-14.jpg</image:loc><image:caption>Untitleddesign14</image:caption><image:title>Untitleddesign14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(107).png</image:loc><image:caption>blogposttext107</image:caption><image:title>blogposttext107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/evilnum-cyberspies-update-arsenal-in-recent-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Week%20logo-3.png</image:loc><image:caption>SecurityWeeklogo3</image:caption><image:title>SecurityWeeklogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-09-29</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-announces-300-percent-revenue-growth-in-2016</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-hacking-stock-markets-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ken_Westin.jpg</image:loc><image:caption>KenWestin</image:caption><image:title>KenWestin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(1).png</image:loc><image:caption>MaliciousLifeTemplate1</image:caption><image:title>MaliciousLifeTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(32).png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-10-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/11-top-xdr-tools-and-how-to-evaluate-them</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-Jan-11-2023-09-16-29-9984-PM.png</image:loc><image:caption>CSOMagazinelogoJan1120230916299984PM</image:caption><image:title>CSOMagazinelogoJan1120230916299984PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2023-01-11</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-and-exabeam-announce-strategic-partnership</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/unclear-if-russia-behind-latest-ukraine-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/VentureBeat%20logo-4.png</image:loc><image:caption>VentureBeatlogo4</image:caption><image:title>VentureBeatlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/not-so-hot-dunkin-warns-of-perks-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Boston%20Herald-3.png</image:loc><image:caption>BostonHerald3</image:caption><image:title>BostonHerald3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-12-03</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-operation-dusty-sky-</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202025-01-17%20at%203.25.26%20PM.png</image:loc><image:caption>Screenshot20250117at32526PM</image:caption><image:title>Screenshot20250117at32526PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-4.png</image:loc><image:caption>image114</image:caption><image:title>image114</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-05-16</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-is-operations-centric-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Register%20logo.png</image:loc><image:caption>TheRegisterlogo</image:caption><image:title>TheRegisterlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/safeguarding-against-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20MEA%20logo.png</image:loc><image:caption>SecurityMEAlogo</image:caption><image:title>SecurityMEAlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-09-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/molerats-apt-returns-with-espionage-play-using-facebook-dropbox</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ThreatPost%20logo-1.png</image:loc><image:caption>ThreatPostlogo1</image:caption><image:title>ThreatPostlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/blog/extend-cloud-detection-and-response-with-sysdig-and-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T093119.758.png</image:loc><image:caption>blogposttext20220830T093119758</image:caption><image:title>blogposttext20220830T093119758</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/sysdig-blog-1.png</image:loc><image:caption>sysdigblog1</image:caption><image:title>sysdigblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cloud-detection-sysdig-featured-image.png</image:loc><image:caption>clouddetectionsysdigfeaturedimage</image:caption><image:title>clouddetectionsysdigfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/sysdig-blog-2.png</image:loc><image:caption>sysdigblog2</image:caption><image:title>sysdigblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(124).png</image:loc><image:caption>blogposttext124</image:caption><image:title>blogposttext124</image:title></image:image><lastmod>2023-10-31</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-maturing-incident-response-and-implementing-better-detection-tools</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/ESG-blog-header.jpg</image:loc><image:caption>ESGblogheader</image:caption><image:title>ESGblogheader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-07-10</lastmod></url><url><loc>https://www.cybereason.com/blog/4-tips-for-implementing-security-by-design-in-the-iot-era</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-2.png</image:loc><image:caption>CISOStoriestemplate42</image:caption><image:title>CISOStoriestemplate42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast.png</image:loc><image:caption>Maliciouslifepodcast</image:caption><image:title>Maliciouslifepodcast</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/the-impact-of-ransomware-in-the-healthcare-sector</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(36).png</image:loc><image:caption>blogposttext36</image:caption><image:title>blogposttext36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(20).png</image:loc><image:caption>blogposttext20</image:caption><image:title>blogposttext20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-03-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/these-are-the-15-largest-us-tech-startup-funding-rounds-of-august-2019</loc><image:image><image:loc>https://www.cybereason.com/hubfs/alleywatch.png</image:loc><image:caption>alleywatch</image:caption><image:title>alleywatch</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-hacking-your-way-into-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Kerissa%20Varma.png</image:loc><image:caption>KerissaVarma</image:caption><image:title>KerissaVarma</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4).png</image:loc><image:caption>CISOStoriestemplate4</image:caption><image:title>CISOStoriestemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-recognized-in-10-hottest-xdr-companies-to-watch-list-for-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/big-50-startup-spotlight-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SU50_Full_Logo.png</image:loc><image:caption>SU50FullLogo</image:caption><image:title>SU50FullLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-chinas-unrestricted-cyberwarfare-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5).png</image:loc><image:caption>MaliciousLifeepisode5</image:caption><image:title>MaliciousLifeepisode5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/110%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>110MALICIOUSLIFE</image:caption><image:title>110MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/research/back-to-the-future-inside-the-kimsuky-kgh-spyware-suite</loc><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky14.png</image:loc><image:caption>kimsuky14</image:caption><image:title>kimsuky14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky2.png</image:loc><image:caption>kimsuky2</image:caption><image:title>kimsuky2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky12.png</image:loc><image:caption>kimsuky12</image:caption><image:title>kimsuky12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky5.png</image:loc><image:caption>kimsuky5</image:caption><image:title>kimsuky5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky36.png</image:loc><image:caption>kimsuky36</image:caption><image:title>kimsuky36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky31-b.png</image:loc><image:caption>kimsuky31b</image:caption><image:title>kimsuky31b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky17.png</image:loc><image:caption>kimsuky17</image:caption><image:title>kimsuky17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky23.png</image:loc><image:caption>kimsuky23</image:caption><image:title>kimsuky23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky3.png</image:loc><image:caption>kimsuky3</image:caption><image:title>kimsuky3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky6.png</image:loc><image:caption>kimsuky6</image:caption><image:title>kimsuky6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky4.png</image:loc><image:caption>kimsuky4</image:caption><image:title>kimsuky4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky27-1.png</image:loc><image:caption>kimsuky271</image:caption><image:title>kimsuky271</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky19.png</image:loc><image:caption>kimsuky19</image:caption><image:title>kimsuky19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky25.png</image:loc><image:caption>kimsuky25</image:caption><image:title>kimsuky25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky29.png</image:loc><image:caption>kimsuky29</image:caption><image:title>kimsuky29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky33.png</image:loc><image:caption>kimsuky33</image:caption><image:title>kimsuky33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky16.png</image:loc><image:caption>kimsuky16</image:caption><image:title>kimsuky16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky20.png</image:loc><image:caption>kimsuky20</image:caption><image:title>kimsuky20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky38.png</image:loc><image:caption>kimsuky38</image:caption><image:title>kimsuky38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky15.png</image:loc><image:caption>kimsuky15</image:caption><image:title>kimsuky15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky18.png</image:loc><image:caption>kimsuky18</image:caption><image:title>kimsuky18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky1.png</image:loc><image:caption>kimsuky1</image:caption><image:title>kimsuky1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky13.png</image:loc><image:caption>kimsuky13</image:caption><image:title>kimsuky13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky10.png</image:loc><image:caption>kimsuky10</image:caption><image:title>kimsuky10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky28.png</image:loc><image:caption>kimsuky28</image:caption><image:title>kimsuky28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky11.png</image:loc><image:caption>kimsuky11</image:caption><image:title>kimsuky11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky30.png</image:loc><image:caption>kimsuky30</image:caption><image:title>kimsuky30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky21.png</image:loc><image:caption>kimsuky21</image:caption><image:title>kimsuky21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky26.png</image:loc><image:caption>kimsuky26</image:caption><image:title>kimsuky26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky22.png</image:loc><image:caption>kimsuky22</image:caption><image:title>kimsuky22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky7.png</image:loc><image:caption>kimsuky7</image:caption><image:title>kimsuky7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky8.png</image:loc><image:caption>kimsuky8</image:caption><image:title>kimsuky8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky9.png</image:loc><image:caption>kimsuky9</image:caption><image:title>kimsuky9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_Kimsuky%20KGH%20Spyware%20Suite%20-%20image.png</image:loc><image:caption>KimsukyKGHSpywareSuiteimage</image:caption><image:title>KimsukyKGHSpywareSuiteimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kimsuky31-a.png</image:loc><image:caption>kimsuky31a</image:caption><image:title>kimsuky31a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-ciso-interview-series-peratons-phil-mazzocco</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_719558953-823928-medium.jpg</image:loc><image:caption>shutterstock719558953823928medium</image:caption><image:title>shutterstock719558953823928medium</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phil%20Mazzocco%20Peraton.jpg</image:loc><image:caption>PhilMazzoccoPeraton</image:caption><image:title>PhilMazzoccoPeraton</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(20).png</image:loc><image:caption>MaliciousLifeepisode20</image:caption><image:title>MaliciousLifeepisode20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/russian-fake-news-explained-mlbside-ep-209.png</image:loc><image:caption>russianfakenewsexplainedmlbsideep209</image:caption><image:title>russianfakenewsexplainedmlbsideep209</image:title></image:image><lastmod>2018-01-18</lastmod></url><url><loc>https://www.cybereason.com/blog/ever-evolving-katie-nickels-on-incident-response-in-a-remote-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ai-potential-cybersecurity-featured.png</image:loc><image:caption>aipotentialcybersecurityfeatured</image:caption><image:title>aipotentialcybersecurityfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(41).png</image:loc><image:caption>blogposttext41</image:caption><image:title>blogposttext41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/katie-nickels-hs.png</image:loc><image:caption>katienickelshs</image:caption><image:title>katienickelshs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/katie-nickels-ever-evolving-card.png</image:loc><image:caption>katienickelseverevolvingcard</image:caption><image:title>katienickelseverevolvingcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hacking-american-beef-the-relentless-rise-of-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Financial%20Times%20logo.png</image:loc><image:caption>FinancialTimeslogo</image:caption><image:title>FinancialTimeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-06-10</lastmod></url><url><loc>https://www.cybereason.com/cybersecurity-101</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/ransomware-true-cost-2022-cover-rounded.png</image:loc><image:caption>ransomwaretruecost2022coverrounded</image:caption><image:title>ransomwaretruecost2022coverrounded</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/CR_Gartner_MQ_EPP_2022_640x480.jpg</image:loc><image:caption>CRGartnerMQEPP2022640x480</image:caption><image:title>CRGartnerMQEPP2022640x480</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/dark-metal-background.png</image:loc><image:caption>darkmetalbackground</image:caption><image:title>darkmetalbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cybersecurity-101-featured.png</image:loc><image:caption>cybersecurity101featured</image:caption><image:title>cybersecurity101featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202022-04-01%20at%2008-53-07%20April%201%2022%20-%20MITRE%20Enterprise%20Eval%2022.png</image:loc><image:caption>Screenshot20220401at085307April122MITREEnterpriseEval22</image:caption><image:title>Screenshot20220401at085307April122MITREEnterpriseEval22</image:title></image:image><lastmod>2024-01-24</lastmod></url><url><loc>https://www.cybereason.com/consulting/digital-forensics-expert-witness-services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Dave-LI.jpg</image:loc><image:caption>DaveLI</image:caption><image:title>DaveLI</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PREVENTION_CR_ICONS-21.svg</image:loc><image:caption>PREVENTIONCRICONS21</image:caption><image:title>PREVENTIONCRICONS21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PROTECT_ENTERPRISE_CR_ICONS-08.png</image:loc><image:caption>PROTECTENTERPRISECRICONS08</image:caption><image:title>PROTECTENTERPRISECRICONS08</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/responder-v2-horizontal.png</image:loc><image:caption>responderv2horizontal</image:caption><image:title>responderv2horizontal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/prevent-id-horizontal-sml.png</image:loc><image:caption>preventidhorizontalsml</image:caption><image:title>preventidhorizontalsml</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Mitre%20Blog%202026.png</image:loc><image:caption>CybereasonMitreBlog2026</image:caption><image:title>CybereasonMitreBlog2026</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PLATFORM2_CR_ICONS-02.svg</image:loc><image:caption>PLATFORM2CRICONS02</image:caption><image:title>PLATFORM2CRICONS02</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-gen-feat-img-web.png</image:loc><image:caption>cybereasongenfeatimgweb</image:caption><image:title>cybereasongenfeatimgweb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/derek-rieck.png</image:loc><image:caption>derekrieck</image:caption><image:title>derekrieck</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owls-all--posed-trans.png</image:loc><image:caption>crowlsallposedtrans</image:caption><image:title>crowlsallposedtrans</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-yellow-divider-line.png</image:loc><image:caption>cybereasonyellowdividerline</image:caption><image:title>cybereasonyellowdividerline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILTY_HUNTING_CR_ICONS-13.png</image:loc><image:caption>VISIBILTYHUNTINGCRICONS13</image:caption><image:title>VISIBILTYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-icon--black.svg</image:loc><image:caption>crlogoiconblack</image:caption><image:title>crlogoiconblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ben-demonte.jpg</image:loc><image:caption>bendemonte</image:caption><image:title>bendemonte</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(36).png</image:loc><image:caption>BLOGImagesTemplatev236</image:caption><image:title>BLOGImagesTemplatev236</image:title></image:image><lastmod>2025-06-03</lastmod></url><url><loc>https://www.cybereason.com/blog/cisos-board-security-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(8).png</image:loc><image:caption>CISOStoriespodcast8</image:caption><image:title>CISOStoriespodcast8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_144792703.jpg</image:loc><image:caption>shutterstock144792703</image:caption><image:title>shutterstock144792703</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-03-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/why-breach-detection-is-your-new-must-have-cyber-security-tool</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/tech_crunch.jpg</image:loc><image:caption>techcrunch</image:caption><image:title>techcrunch</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-launches-technology-partner-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-05-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/industry-experts-comment-on-norsk-hydro-cyberattack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IntelligentCISO.jpg</image:loc><image:caption>IntelligentCISO</image:caption><image:title>IntelligentCISO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2019-03-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iranian-hacking-groups-pick-up-the-pace-with-new-attacks-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Searchsecurity%20logo-3.jpg</image:loc><image:caption>Searchsecuritylogo3</image:caption><image:title>Searchsecuritylogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-unveils-new-mobile-device-security-offerings</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/securityweek-6.png</image:loc><image:caption>securityweek6</image:caption><image:title>securityweek6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-04-28</lastmod></url><url><loc>https://www.cybereason.com/blog/labs-shadowwali-new-variant-of-the-xxmm-family-of-backdoors</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image19_censored-1.jpg</image:loc><image:caption>image19censored1</image:caption><image:title>image19censored1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image36.png</image:loc><image:caption>image36</image:caption><image:title>image36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Untitled-design-16-1.png</image:loc><image:caption>Untitleddesign161</image:caption><image:title>Untitleddesign161</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image33-1.png</image:loc><image:caption>image331</image:caption><image:title>image331</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image05-1.png</image:loc><image:caption>image051</image:caption><image:title>image051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image14-1.png</image:loc><image:caption>image141</image:caption><image:title>image141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image34.png</image:loc><image:caption>image34</image:caption><image:title>image34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-3.png</image:loc><image:caption>image83</image:caption><image:title>image83</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image32.png</image:loc><image:caption>image32</image:caption><image:title>image32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image40.png</image:loc><image:caption>image40</image:caption><image:title>image40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image33.png</image:loc><image:caption>image33</image:caption><image:title>image33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image30-1.png</image:loc><image:caption>image301</image:caption><image:title>image301</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-1.png</image:loc><image:caption>image181</image:caption><image:title>image181</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Untitled-design-12-1.png</image:loc><image:caption>Untitleddesign121</image:caption><image:title>Untitleddesign121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image17-2.png</image:loc><image:caption>image172</image:caption><image:title>image172</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image43.png</image:loc><image:caption>image43</image:caption><image:title>image43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Untitled-design-34-1.png</image:loc><image:caption>Untitleddesign341</image:caption><image:title>Untitleddesign341</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Untitled-design-27-1.png</image:loc><image:caption>Untitleddesign271</image:caption><image:title>Untitleddesign271</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-3.png</image:loc><image:caption>image53</image:caption><image:title>image53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image-that-needs-site-name-blurred_censored-1.jpg</image:loc><image:caption>imagethatneedssitenameblurredcensored1</image:caption><image:title>imagethatneedssitenameblurredcensored1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-1.png</image:loc><image:caption>image161</image:caption><image:title>image161</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image41.png</image:loc><image:caption>image41</image:caption><image:title>image41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image21-2.png</image:loc><image:caption>image212</image:caption><image:title>image212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-2.png</image:loc><image:caption>image62</image:caption><image:title>image62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image07-1.png</image:loc><image:caption>image071</image:caption><image:title>image071</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image39-1.png</image:loc><image:caption>image391</image:caption><image:title>image391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-1.png</image:loc><image:caption>image241</image:caption><image:title>image241</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image27_censored-1.jpg</image:loc><image:caption>image27censored1</image:caption><image:title>image27censored1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(27)-1.png</image:loc><image:caption>CybereasonBlogTemplate271</image:caption><image:title>CybereasonBlogTemplate271</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image23-1.png</image:loc><image:caption>image231</image:caption><image:title>image231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image31.png</image:loc><image:caption>image31</image:caption><image:title>image31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-3.png</image:loc><image:caption>image153</image:caption><image:title>image153</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-2.png</image:loc><image:caption>image92</image:caption><image:title>image92</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Untitled-design-35-1.png</image:loc><image:caption>Untitleddesign351</image:caption><image:title>Untitleddesign351</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/assaf-hs-hex.png</image:loc><image:caption>assafhshex</image:caption><image:title>assafhshex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image09-1.png</image:loc><image:caption>image091</image:caption><image:title>image091</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image28.png</image:loc><image:caption>image28</image:caption><image:title>image28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27.png</image:loc><image:caption>image27</image:caption><image:title>image27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image03-1.png</image:loc><image:caption>image031</image:caption><image:title>image031</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-5.png</image:loc><image:caption>image35</image:caption><image:title>image35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-1.png</image:loc><image:caption>image111</image:caption><image:title>image111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Stellar-Discovery_v2.png</image:loc><image:caption>BLOGStellarDiscoveryv2</image:caption><image:title>BLOGStellarDiscoveryv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image35.png</image:loc><image:caption>image35</image:caption><image:title>image35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image15-1.png</image:loc><image:caption>image151</image:caption><image:title>image151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Untitled-design-22-1.png</image:loc><image:caption>Untitleddesign221</image:caption><image:title>Untitleddesign221</image:title></image:image><lastmod>2021-11-09</lastmod></url><url><loc>https://www.cybereason.com/resources/mitre-attack-evaluation-results</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Split_1920x1080.jpg</image:loc><image:caption>Split1920x1080</image:caption><image:title>Split1920x1080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-03-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-government-inc.-issues-ransomware-holiday-warning</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-11-22</lastmod></url><url><loc>https://www.cybereason.com/resources/edr-or-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-2.png</image:loc><image:caption>EDRorXDRcard2</image:caption><image:title>EDRorXDRcard2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-06-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/was-a-dyn-researcher-the-revenge-target-of-fridays-web-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/mitre-attck-evaluations-unpacking-the-emulation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel.png</image:loc><image:caption>israel</image:caption><image:title>israel</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Webinar-blog.png</image:loc><image:caption>MITREWebinarblog</image:caption><image:title>MITREWebinarblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eric.png</image:loc><image:caption>eric</image:caption><image:title>eric</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.cybereason.com/blog/edr-buyers-guide-microsoft-e5-licenses-and-security-risks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Oct-26-2021-02-52-04-01-PM.png</image:loc><image:caption>CaptureOct26202102520401PM</image:caption><image:title>CaptureOct26202102520401PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(2).png</image:loc><image:caption>CybereasonBlogtemplate2</image:caption><image:title>CybereasonBlogtemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(18).png</image:loc><image:caption>CybereasonBlogTemplate18</image:caption><image:title>CybereasonBlogTemplate18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-10-26</lastmod></url><url><loc>https://www.cybereason.com/blog/rising-threat-from-lockbit-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/tony-author.png</image:loc><image:caption>tonyauthor</image:caption><image:title>tonyauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(41).png</image:loc><image:caption>CybereasonBlogTemplate41</image:caption><image:title>CybereasonBlogTemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>140MALICIOUSLIFE</image:caption><image:title>140MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(31).png</image:loc><image:caption>image31</image:caption><image:title>image31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(6)-2.png</image:loc><image:caption>CybereasonBlogTemplate62</image:caption><image:title>CybereasonBlogTemplate62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(29).png</image:loc><image:caption>image29</image:caption><image:title>image29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-01-13</lastmod></url><url><loc>https://www.cybereason.com/blog/biden-admin-takes-action-to-defend-electric-utilities-against-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(7).png</image:loc><image:caption>CybereasonBlogTemplate7</image:caption><image:title>CybereasonBlogTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Electric-blog.png</image:loc><image:caption>Electricblog</image:caption><image:title>Electricblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-best-emerging-technology</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-russian-spy-games-moved-online-massive-breach-shows-how-espionage-is-carried-out-in-the-21st-century</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/USA%20Today%20logo.png</image:loc><image:caption>USATodaylogo</image:caption><image:title>USATodaylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/backdoor-in-ms-outlook-webmail-raises-security-doubts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/researchers-find-fresh-fodder-for-iot-attack-cannons</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Untitled-design-15.png</image:loc><image:caption>Untitleddesign15</image:caption><image:title>Untitleddesign15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-20</lastmod></url><url><loc>https://www.cybereason.com/blog/international-womens-day-ubu-and-lead-like-a-girl</loc><image:image><image:loc>https://www.cybereason.com/hubfs/meg-oleary-square.jpg</image:loc><image:caption>megolearysquare</image:caption><image:title>megolearysquare</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/meg-oleary-600px.jpg</image:loc><image:caption>megoleary600px</image:caption><image:title>megoleary600px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202025-01-17%20at%203.25.26%20PM.png</image:loc><image:caption>Screenshot20250117at32526PM</image:caption><image:title>Screenshot20250117at32526PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IWD%20blog%20Meg%20OLeary.png</image:loc><image:caption>IWDblogMegOLeary</image:caption><image:title>IWDblogMegOLeary</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(65).png</image:loc><image:caption>blogposttext65</image:caption><image:title>blogposttext65</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-03-08</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereasons-securema-coalition-intelligence-briefing-featured-fbis-boston-special-agent-in-charge-harold-h.-shaw</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2018-05-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-campaign-alters-variants-to-evade-detection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/unnamed-1.jpg</image:loc><image:caption>unnamed1</image:caption><image:title>unnamed1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/tis-the-season-for-securing-consumer-gadgets</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(7).png</image:loc><image:caption>CybereasonBlogTemplate7</image:caption><image:title>CybereasonBlogTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/dreamstime_s_33969379-618x391.jpg</image:loc><image:caption>dreamstimes33969379618x391</image:caption><image:title>dreamstimes33969379618x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/planned-parenthood-ransomware-attack-puts-lives-at-risk</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(114).png</image:loc><image:caption>blogposttext114</image:caption><image:title>blogposttext114</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(10)-1.png</image:loc><image:caption>CybereasonBlogTemplate101</image:caption><image:title>CybereasonBlogTemplate101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/tony-author.png</image:loc><image:caption>tonyauthor</image:caption><image:title>tonyauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(6)-2.png</image:loc><image:caption>CybereasonBlogTemplate62</image:caption><image:title>CybereasonBlogTemplate62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/record-setting-40m-ransom-paid-to-attackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(2).png</image:loc><image:caption>CybereasonBlogTemplate2</image:caption><image:title>CybereasonBlogTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(77).png</image:loc><image:caption>blogposttext77</image:caption><image:title>blogposttext77</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-05-28</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-intelligence-group-issues-report-examining-destructive-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-deploy-bumblebee-loader-to-breach-target-networks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Aug-22-2022-05-50-04-74-PM.png</image:loc><image:caption>InfosecurityMagazinelogoAug22202205500474PM</image:caption><image:title>InfosecurityMagazinelogoAug22202205500474PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-08-22</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-a-strong-performer-in-mdr-report-by-independent-research-firm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/chaim-mazal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/chaim-resized.jpeg</image:loc><image:caption>chaimresized</image:caption><image:title>chaimresized</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(2)-2.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews22</image:caption><image:title>CopyofBLOGSOCIALSETNews22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://www.cybereason.com/blog/the-gentlemen-ransomware</loc><lastmod>2025-11-18</lastmod></url><url><loc>https://www.cybereason.com/resources/generating-a-hypothesis-in-a-threat-hunt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Waterfall_Texture_Dark_1920x1080.jpg</image:loc><image:caption>WaterfallTextureDark1920x1080</image:caption><image:title>WaterfallTextureDark1920x1080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2019-05-28</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-builds-honeypot-and-traps-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-capital-one-breach-is-unlike-any-other-major-hack-with-allegations-of-a-single-engineer-wreaking-havoc</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC_logo.svg-1.png</image:loc><image:caption>CNBClogosvg1</image:caption><image:title>CNBClogosvg1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2019-07-31</lastmod></url><url><loc>https://www.cybereason.com/threat-alert-bitbucket-malware-arsenal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-impacted-geo.png</image:loc><image:caption>criconimpactedgeo</image:caption><image:title>criconimpactedgeo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner-Page-Icons-03.png</image:loc><image:caption>PartnerPageIcons03</image:caption><image:title>PartnerPageIcons03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-block-executable.png</image:loc><image:caption>criconblockexecutable</image:caption><image:title>criconblockexecutable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/YELLOW_THREAT_ALERT_CR_ICONS-53.svg</image:loc><image:caption>YELLOWTHREATALERTCRICONS53</image:caption><image:title>YELLOWTHREATALERTCRICONS53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-hero-bg.jpg</image:loc><image:caption>threatalertherobg</image:caption><image:title>threatalertherobg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-attack-goal.png</image:loc><image:caption>criconattackgoal</image:caption><image:title>criconattackgoal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-remediate-disable.png</image:loc><image:caption>criconremediatedisable</image:caption><image:title>criconremediatedisable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-threat-type.png</image:loc><image:caption>criconthreattype</image:caption><image:title>criconthreattype</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/resources/live-attack-simulation-with-eric-sun</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Live-Attack-Sim-Webinar-On-Demand-1.png</image:loc><image:caption>LiveAttackSimWebinarOnDemand1</image:caption><image:title>LiveAttackSimWebinarOnDemand1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-08-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/colonial-pipeline-cyberattacker-darkside-what-to-know</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fox%20Business%20logo-1.png</image:loc><image:caption>FoxBusinesslogo1</image:caption><image:title>FoxBusinesslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://www.cybereason.com/blog/summer-webinar-series-with-cso-sam-curry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cyber%20Summer%20with%20Curry%20(4)-2.png</image:loc><image:caption>CyberSummerwithCurry42</image:caption><image:title>CyberSummerwithCurry42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry.png</image:loc><image:caption>SamCurry</image:caption><image:title>SamCurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-07-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-olympic-destroyer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(6).png</image:loc><image:caption>Maliciouslifepodcast6</image:caption><image:title>Maliciouslifepodcast6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-raises-275m-at-series-f-adds-steven-mnuchin-to-board</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechCrunch%20logo-Jul-15-2021-12-38-10-30-AM.png</image:loc><image:caption>TechCrunchlogoJul15202112381030AM</image:caption><image:title>TechCrunchlogoJul15202112381030AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-07-15</lastmod></url><url><loc>https://www.cybereason.com/blog/cyber-defenders-council-report-defend-forward-a-proactive-model-for-cyber-deterrence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-May-16-2022-03-35-59-62-PM.png</image:loc><image:caption>CaptureMay16202203355962PM</image:caption><image:title>CaptureMay16202203355962PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(111).png</image:loc><image:caption>blogposttext111</image:caption><image:title>blogposttext111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(105)-1.png</image:loc><image:caption>blogposttext1051</image:caption><image:title>blogposttext1051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(5).png</image:loc><image:caption>ImagefromiOS5</image:caption><image:title>ImagefromiOS5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-05-25</lastmod></url><url><loc>https://www.cybereason.com/blog/targetingedge-mac-os-x-pirrit-malware-adware-still-active</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/5%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>5OSXPirritMacAdware</image:caption><image:title>5OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/7%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>7OSXPirritMacAdware</image:caption><image:title>7OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/33%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>33OSXPirritMacAdware</image:caption><image:title>33OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/11%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>11OSXPirritMacAdware</image:caption><image:title>11OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/13%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>13OSXPirritMacAdware</image:caption><image:title>13OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/14%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>14OSXPirritMacAdware</image:caption><image:title>14OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/base64%201.png</image:loc><image:caption>base641</image:caption><image:title>base641</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/22%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>22OSXPirritMacAdware</image:caption><image:title>22OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/15%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>15OSXPirritMacAdware</image:caption><image:title>15OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/12%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>12OSXPirritMacAdware</image:caption><image:title>12OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/23%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>23OSXPirritMacAdware</image:caption><image:title>23OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/21%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>21OSXPirritMacAdware</image:caption><image:title>21OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/2%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>2OSXPirritMacAdware</image:caption><image:title>2OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/OSXPirritPartIII.png</image:loc><image:caption>OSXPirritPartIII</image:caption><image:title>OSXPirritPartIII</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/18%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>18OSXPirritMacAdware</image:caption><image:title>18OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/19%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>19OSXPirritMacAdware</image:caption><image:title>19OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/4%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>4OSXPirritMacAdware</image:caption><image:title>4OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/34%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>34OSXPirritMacAdware</image:caption><image:title>34OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/35%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>35OSXPirritMacAdware</image:caption><image:title>35OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/20%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>20OSXPirritMacAdware</image:caption><image:title>20OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/25%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>25OSXPirritMacAdware</image:caption><image:title>25OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/tefullreply.png</image:loc><image:caption>tefullreply</image:caption><image:title>tefullreply</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/1%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>1OSXPirritMacAdware</image:caption><image:title>1OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/32%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>32OSXPirritMacAdware</image:caption><image:title>32OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/8%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>8OSXPirritMacAdware</image:caption><image:title>8OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/6%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>6OSXPirritMacAdware</image:caption><image:title>6OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/28%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>28OSXPirritMacAdware</image:caption><image:title>28OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/base64%202.png</image:loc><image:caption>base642</image:caption><image:title>base642</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/24%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>24OSXPirritMacAdware</image:caption><image:title>24OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/31%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>31OSXPirritMacAdware</image:caption><image:title>31OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/17%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>17OSXPirritMacAdware</image:caption><image:title>17OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/29%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>29OSXPirritMacAdware</image:caption><image:title>29OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/16%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>16OSXPirritMacAdware</image:caption><image:title>16OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/26%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>26OSXPirritMacAdware</image:caption><image:title>26OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/10%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>10OSXPirritMacAdware</image:caption><image:title>10OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/36%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>36OSXPirritMacAdware</image:caption><image:title>36OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/30%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>30OSXPirritMacAdware</image:caption><image:title>30OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Pasted%20image%20at%202017_12_11%2004_36%20PM.png</image:loc><image:caption>Pastedimageat201712110436PM</image:caption><image:title>Pastedimageat201712110436PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(84).png</image:loc><image:caption>blogposttext84</image:caption><image:title>blogposttext84</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/3%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>3OSXPirritMacAdware</image:caption><image:title>3OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/27%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>27OSXPirritMacAdware</image:caption><image:title>27OSXPirritMacAdware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/Pirrit3/9%20OSX%20Pirrit%20Mac%20Adware.png</image:loc><image:caption>9OSXPirritMacAdware</image:caption><image:title>9OSXPirritMacAdware</image:title></image:image><lastmod>2019-06-27</lastmod></url><url><loc>https://www.cybereason.com/resources/new-lateral-movement-techniques-abuse-dcom-technology</loc><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_719558953-1.jpg</image:loc><image:caption>shutterstock7195589531</image:caption><image:title>shutterstock7195589531</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2018-04-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/https/gulfbusiness.com/deepfakes-novel-trend-or-novel-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Gulf%20Business%20logo.png</image:loc><image:caption>GulfBusinesslogo</image:caption><image:title>GulfBusinesslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-10-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ignition-technology-and-cybereason-partner</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ComputerWeekly-3.png</image:loc><image:caption>ComputerWeekly3</image:caption><image:title>ComputerWeekly3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-pa-bell-vs.-youth-international-party-line</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/chesh020513_400x400.jpg</image:loc><image:caption>chesh020513400x400</image:caption><image:title>chesh020513400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/49%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>49MALICIOUSLIFE</image:caption><image:title>49MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-xdr-for-cloud-workloads-secures-native-and-hybrid-cloud-environments-at-petabyte-scale</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-02-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/china-targeting-covid-19-researchers-through-it-suppliers-claims-us</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ComputerWeekly%20logo.jpg</image:loc><image:caption>ComputerWeeklylogo</image:caption><image:title>ComputerWeeklylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/blog/product/predictive-ransomware-protection-the-key-to-ending-a-global-crisis</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(21).png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(11)-1.png</image:loc><image:caption>CybereasonBlogTemplate111</image:caption><image:title>CybereasonBlogTemplate111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(19).png</image:loc><image:caption>blogposttext19</image:caption><image:title>blogposttext19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/protecting-automotive-industry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/video-background.jpg</image:loc><image:caption>videobackground</image:caption><image:title>videobackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/alessio-lin-236486.jpg</image:loc><image:caption>alessiolin236486</image:caption><image:title>alessiolin236486</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/platform-bg-shape-sm.png</image:loc><image:caption>platformbgshapesm</image:caption><image:title>platformbgshapesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/play%20button.png</image:loc><image:caption>playbutton</image:caption><image:title>playbutton</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gray-bg.jpg</image:loc><image:caption>graybg</image:caption><image:title>graybg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/full-background.png</image:loc><image:caption>fullbackground</image:caption><image:title>fullbackground</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/these-10-boston-tech-companies-raised-a-combined-7b-in-2021</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BuiltIn%20Boston%20logo.png</image:loc><image:caption>BuiltInBostonlogo</image:caption><image:title>BuiltInBostonlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-boston-as-the-hub-of-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(112).png</image:loc><image:caption>blogposttext112</image:caption><image:title>blogposttext112</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(68).png</image:loc><image:caption>blogposttext68</image:caption><image:title>blogposttext68</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Boston-Skyline.png</image:loc><image:caption>BostonSkyline</image:caption><image:title>BostonSkyline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-01-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/bit9-buys-carbon-black-gets-38m-to-try-to-win-security-arms-race</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/conomy.jpg</image:loc><image:caption>conomy</image:caption><image:title>conomy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/the-challenges-of-detecting-compromised-public-web-servers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T071524.894.png</image:loc><image:caption>blogposttext20220707T071524894</image:caption><image:title>blogposttext20220707T071524894</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/oliver-cole-112206.jpg</image:loc><image:caption>olivercole112206</image:caption><image:title>olivercole112206</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(7).png</image:loc><image:caption>BLOGImagesTemplatev27</image:caption><image:title>BLOGImagesTemplatev27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/matanb.jpg</image:loc><image:caption>matanb</image:caption><image:title>matanb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-10.png</image:loc><image:caption>image110</image:caption><image:title>image110</image:title></image:image><lastmod>2018-02-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-gets-100-million-investment</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/BostonGlobe.jpg</image:loc><image:caption>BostonGlobe</image:caption><image:title>BostonGlobe</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-yahoos-ugly-death-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/89%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>89MALICIOUSLIFE</image:caption><image:title>89MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(2).png</image:loc><image:caption>Maliciouslifepodcast2</image:caption><image:title>Maliciouslifepodcast2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/microsoft-cisa-confirm-windows-10-zero-day-attack-can-you-stop-it</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes%20logo-Sep-22-2021-01-22-25-61-AM.png</image:loc><image:caption>ForbeslogoSep22202101222561AM</image:caption><image:title>ForbeslogoSep22202101222561AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-09-22</lastmod></url><url><loc>https://www.cybereason.com/resources/more-efficient-security-operations/webinar/us/101322</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/SOC-Efficiency-Webinar-10-13-22.png</image:loc><image:caption>SOCEfficiencyWebinar101322</image:caption><image:title>SOCEfficiencyWebinar101322</image:title></image:image><lastmod>2023-02-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-virtual-tour-of-4-of-bostons-coolest-tech-offices</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/BuiltinBoston.png</image:loc><image:caption>BuiltinBoston</image:caption><image:title>BuiltinBoston</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/the-private-infrastructure-security-renaissance</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-cranford-author.png</image:loc><image:caption>jjcranfordauthor</image:caption><image:title>jjcranfordauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Renaissance.png</image:loc><image:caption>Renaissance</image:caption><image:title>Renaissance</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(34).png</image:loc><image:caption>blogposttext34</image:caption><image:title>blogposttext34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(81).png</image:loc><image:caption>blogposttext81</image:caption><image:title>blogposttext81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-01-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cambridge-cybersecurity-firm-lands-25m-from-lockheed-martin-others</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Boston-Business-Journal.jpg</image:loc><image:caption>BostonBusinessJournal</image:caption><image:title>BostonBusinessJournal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/product/cybereason-xdr-achieving-10x-reduction-in-false-positives</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-ai.png</image:loc><image:caption>cybereasonxdrai</image:caption><image:title>cybereasonxdrai</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRXDR.png</image:loc><image:caption>CRXDR</image:caption><image:title>CRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zerotrust.png</image:loc><image:caption>zerotrust</image:caption><image:title>zerotrust</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/adobe-worm-faker-uses-lolbins-and-dynamic-techniques-to-deliver-customized-payloads</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image-116.png</image:loc><image:caption>image116</image:caption><image:title>image116</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-107.png</image:loc><image:caption>image107</image:caption><image:title>image107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xy-backdoor-blog-featured.png</image:loc><image:caption>xybackdoorblogfeatured</image:caption><image:title>xybackdoorblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-106.png</image:loc><image:caption>image106</image:caption><image:title>image106</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-113.png</image:loc><image:caption>image113</image:caption><image:title>image113</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-105.png</image:loc><image:caption>image105</image:caption><image:title>image105</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-103.png</image:loc><image:caption>image103</image:caption><image:title>image103</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-101.png</image:loc><image:caption>image101</image:caption><image:title>image101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-114.png</image:loc><image:caption>image114</image:caption><image:title>image114</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-99.png</image:loc><image:caption>image99</image:caption><image:title>image99</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-109.png</image:loc><image:caption>image109</image:caption><image:title>image109</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-112.png</image:loc><image:caption>image112</image:caption><image:title>image112</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-115.png</image:loc><image:caption>image115</image:caption><image:title>image115</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-111.png</image:loc><image:caption>image111</image:caption><image:title>image111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Stellar-Discovery_v2.png</image:loc><image:caption>BLOGStellarDiscoveryv2</image:caption><image:title>BLOGStellarDiscoveryv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-108.png</image:loc><image:caption>image108</image:caption><image:title>image108</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-110.png</image:loc><image:caption>image110</image:caption><image:title>image110</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-104.png</image:loc><image:caption>image104</image:caption><image:title>image104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-100.png</image:loc><image:caption>image100</image:caption><image:title>image100</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-102.png</image:loc><image:caption>image102</image:caption><image:title>image102</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/shifting-from-prevention-to-real-time</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/paz_breach2-1.png</image:loc><image:caption>pazbreach21</image:caption><image:title>pazbreach21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(60).png</image:loc><image:caption>blogposttext60</image:caption><image:title>blogposttext60</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-he-fought-the-ftc-over-a-breach-and-won</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20FTC%20Breach-1.png</image:loc><image:caption>CISOFTCBreach1</image:caption><image:title>CISOFTCBreach1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(3)-2.png</image:loc><image:caption>CISOStoriestemplate32</image:caption><image:title>CISOStoriestemplate32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(1)-4.png</image:loc><image:caption>pastedimage014</image:caption><image:title>pastedimage014</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-1.png</image:loc><image:caption>CISOStoriestemplate71</image:caption><image:title>CISOStoriestemplate71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-09-21</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-how-resilient-is-our-banking-system</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-239-Card.png</image:loc><image:caption>MLEp239Card</image:caption><image:title>MLEp239Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(14).png</image:loc><image:caption>MaliciousLifeepisode14</image:caption><image:title>MaliciousLifeepisode14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jeff%20Engles.jpg</image:loc><image:caption>JeffEngles</image:caption><image:title>JeffEngles</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode.png</image:loc><image:caption>MaliciousLifeepisode</image:caption><image:title>MaliciousLifeepisode</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><lastmod>2022-03-16</lastmod></url><url><loc>https://www.cybereason.com/threat-alert-new-trickbot-variants</loc><image:image><image:loc>https://www.cybereason.com/hubfs/icons-all/Asset%201077.png</image:loc><image:caption>Asset1077</image:caption><image:title>Asset1077</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-badge-orange.png</image:loc><image:caption>threatalertbadgeorange</image:caption><image:title>threatalertbadgeorange</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-attack-goal.png</image:loc><image:caption>criconattackgoal</image:caption><image:title>criconattackgoal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-impacted-geo.png</image:loc><image:caption>criconimpactedgeo</image:caption><image:title>criconimpactedgeo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-hero-bg.jpg</image:loc><image:caption>threatalertherobg</image:caption><image:title>threatalertherobg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-remediate-disable.png</image:loc><image:caption>criconremediatedisable</image:caption><image:title>criconremediatedisable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-threat-type.png</image:loc><image:caption>criconthreattype</image:caption><image:title>criconthreattype</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner-Page-Icons-03.png</image:loc><image:caption>PartnerPageIcons03</image:caption><image:title>PartnerPageIcons03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/blog/accelerate-investigations-with-the-new-cybereason-process-timeline-feature</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Figure%205Ability%20to%20filter%20the%20dataset.png</image:loc><image:caption>Figure5Abilitytofilterthedataset</image:caption><image:title>Figure5Abilitytofilterthedataset</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/headshot.jpeg</image:loc><image:caption>headshot</image:caption><image:title>headshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Figure%203%20Ability%20to%20change%20%2B-%20timeframe%20in%20increments%20of%205%20minutes.png</image:loc><image:caption>Figure3Abilitytochangetimeframeinincrementsof5minutes</image:caption><image:title>Figure3Abilitytochangetimeframeinincrementsof5minutes</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/machine-timeline-enhancements.png</image:loc><image:caption>machinetimelineenhancements</image:caption><image:title>machinetimelineenhancements</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Process%20Timeline.png</image:loc><image:caption>BlogProcessTimeline</image:caption><image:title>BlogProcessTimeline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(119).png</image:loc><image:caption>blogposttext119</image:caption><image:title>blogposttext119</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Figure%204%20Ability%20to%20pivot%20into%20event%20details.png</image:loc><image:caption>Figure4Abilitytopivotintoeventdetails</image:caption><image:title>Figure4Abilitytopivotintoeventdetails</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Figure%202%20Process%20Timeline%20view%20showing%20events%205%20minutes%20around%20the%20lead%20event.png</image:loc><image:caption>Figure2ProcessTimelineviewshowingevents5minutesaroundtheleadevent</image:caption><image:title>Figure2ProcessTimelineviewshowingevents5minutesaroundtheleadevent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-07-06</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-wins-best-security-vendor-podcast</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-06T130708.511.png</image:loc><image:caption>blogposttext20220706T130708511</image:caption><image:title>blogposttext20220706T130708511</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/138%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>138MALICIOUSLIFE</image:caption><image:title>138MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2022-07-06</lastmod></url><url><loc>https://www.cybereason.com/blog/information-security-buzz-features-cybereason-findings-on-detection-privileges-escalation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(18).png</image:loc><image:caption>BLOGImagesTemplatev218</image:caption><image:title>BLOGImagesTemplatev218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/2024-mitre-critical-metrics</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE%20ATT&amp;CK%20Enterprise%20Evaluation%202024_Final.pptx.png</image:loc><image:caption>MITREATTCKEnterpriseEvaluation2024Finalpptx</image:caption><image:title>MITREATTCKEnterpriseEvaluation2024Finalpptx</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v4_Page_1.png</image:loc><image:caption>BLOGImagesTemplatev4Page1</image:caption><image:title>BLOGImagesTemplatev4Page1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-05T144829.712.png</image:loc><image:caption>blogposttext20220705T144829712</image:caption><image:title>blogposttext20220705T144829712</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-16T071025.313.png</image:loc><image:caption>blogposttext20220816T071025313</image:caption><image:title>blogposttext20220816T071025313</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2024-12-31</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-assemble-lockbit-3</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T103718.231.png</image:loc><image:caption>blogposttext20220914T103718231</image:caption><image:title>blogposttext20220914T103718231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lockbit-3-cover.png</image:loc><image:caption>lockbit3cover</image:caption><image:title>lockbit3cover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lockbit-3-blog-card.png</image:loc><image:caption>lockbit3blogcard</image:caption><image:title>lockbit3blogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lockbit3-a.png</image:loc><image:caption>lockbit3a</image:caption><image:title>lockbit3a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lockbit3-b.png</image:loc><image:caption>lockbit3b</image:caption><image:title>lockbit3b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Kotaro-Ogino.jpg</image:loc><image:caption>KotaroOgino</image:caption><image:title>KotaroOgino</image:title></image:image><lastmod>2023-08-21</lastmod></url><url><loc>https://www.cybereason.com/blog/research/wannamine-cryptominer-eternalblue-wannacry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image13-7.png</image:loc><image:caption>image137</image:caption><image:title>image137</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-7.png</image:loc><image:caption>image47</image:caption><image:title>image47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-5.png</image:loc><image:caption>image115</image:caption><image:title>image115</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-6.png</image:loc><image:caption>image66</image:caption><image:title>image66</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-13.png</image:loc><image:caption>image213</image:caption><image:title>image213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-6.png</image:loc><image:caption>image96</image:caption><image:title>image96</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-6.png</image:loc><image:caption>image126</image:caption><image:title>image126</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-17.png</image:loc><image:caption>image117</image:caption><image:title>image117</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-7.png</image:loc><image:caption>image147</image:caption><image:title>image147</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-9.png</image:loc><image:caption>image89</image:caption><image:title>image89</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-6.png</image:loc><image:caption>image156</image:caption><image:title>image156</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-7.png</image:loc><image:caption>image77</image:caption><image:title>image77</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-9.png</image:loc><image:caption>image59</image:caption><image:title>image59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-featured-image.png</image:loc><image:caption>crfeaturedimage</image:caption><image:title>crfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-10.png</image:loc><image:caption>image310</image:caption><image:title>image310</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-6.png</image:loc><image:caption>image106</image:caption><image:title>image106</image:title></image:image><lastmod>2022-07-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinese-and-russian-hack-attacks-put-asx-cybersecurity-shares-in-spotlight</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Motley%20Fool%20logo.png</image:loc><image:caption>TheMotleyFoollogo</image:caption><image:title>TheMotleyFoollogo</image:title></image:image><lastmod>2021-03-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecurity-c-level-execs-tackle-shift-to-remote-work</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRNtv%20logo.png</image:loc><image:caption>CRNtvlogo</image:caption><image:title>CRNtvlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-discovers-global-botnet-campaign-leveraging-microsoft-exchange-vulnerabilities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-04-22</lastmod></url><url><loc>https://www.cybereason.com/ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/ransomware-fundamentals-card.png</image:loc><image:caption>ransomwarefundamentalscard</image:caption><image:title>ransomwarefundamentalscard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ransomops-wp-featured.png</image:loc><image:caption>ransomopswpfeatured</image:caption><image:title>ransomopswpfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware-true-cost-2024-cover.png</image:loc><image:caption>ransomwaretruecost2024cover</image:caption><image:title>ransomwaretruecost2024cover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/olist-cover-thumb-small.png</image:loc><image:caption>olistcoverthumbsmall</image:caption><image:title>olistcoverthumbsmall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/gartner-research-improve-endpoint-security-card.png</image:loc><image:caption>gartnerresearchimproveendpointsecuritycard</image:caption><image:title>gartnerresearchimproveendpointsecuritycard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cybereason-vs-ransomware-ebook-thumbnail.jpg</image:loc><image:caption>cybereasonvsransomwareebookthumbnail</image:caption><image:title>cybereasonvsransomwareebookthumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/mitre-2023-resource-card.png</image:loc><image:caption>mitre2023resourcecard</image:caption><image:title>mitre2023resourcecard</image:title></image:image><lastmod>2025-06-16</lastmod></url><url><loc>https://www.cybereason.com/resources/how-large-language-models-are-evolving</loc><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/How-LLMs-Evolving-Cybersecurity-July-2024.png</image:loc><image:caption>HowLLMsEvolvingCybersecurityJuly2024</image:caption><image:title>HowLLMsEvolvingCybersecurityJuly2024</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-07-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/google-uncovers-iphone-vulnerabilities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bloomberg%20Technology%20logo-1.jpg</image:loc><image:caption>BloombergTechnologylogo1</image:caption><image:title>BloombergTechnologylogo1</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-listeners-survey-special</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/56%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>56MALICIOUSLIFE</image:caption><image:title>56MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-226-Card.png</image:loc><image:caption>MLEp226Card</image:caption><image:title>MLEp226Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-scores-4.7/5.0-rating-in-gartner-peer-insights</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sam-currys-contributed-article-time-to-lighten-the-load-on-our-growing-cyber-albatross</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Apr-03-2022-11-00-20-20-PM.png</image:loc><image:caption>SCMagazinelogoApr03202211002020PM</image:caption><image:title>SCMagazinelogoApr03202211002020PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-04-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-taxpayers-targeted-with-rat-malware-in-ongoing-phishing-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bleeping%20Computer%20logo-1.png</image:loc><image:caption>BleepingComputerlogo1</image:caption><image:title>BleepingComputerlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-03-18</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-announces-record-growth-in-2017</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-world-renowned-ai-hunting-tour-will-visit-35-cities-across-the-united-states</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-08-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-is-av-comparatives-certified</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(12).png</image:loc><image:caption>blogposttext12</image:caption><image:title>blogposttext12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Defendercon_LP_no%20time.jpg</image:loc><image:caption>1200x627DefenderconLPnotime</image:caption><image:title>1200x627DefenderconLPnotime</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Golden-AV-Comparative-Blog-A.png</image:loc><image:caption>GoldenAVComparativeBlogA</image:caption><image:title>GoldenAVComparativeBlogA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Approved_Business_2020.png</image:loc><image:caption>ApprovedBusiness2020</image:caption><image:title>ApprovedBusiness2020</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-the-dark-web-ransomware-marketplace</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-1.png</image:loc><image:caption>CybereasonBlogTemplate41</image:caption><image:title>CybereasonBlogTemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(19)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews191</image:caption><image:title>CopyofBLOGSOCIALSETNews191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(2)-3.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews23</image:caption><image:title>CopyofBLOGSOCIALSETNews23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/scam-azon-this-dangerous-amazon-gift-card-scam-will-hack-your-bank-account-in-seconds</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Sun%20logo.png</image:loc><image:caption>TheSunlogo</image:caption><image:title>TheSunlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-01-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/security-companies-address-log4shell-as-more-products-emerge-as-vulnerable</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Dec-14-2021-03-14-36-83-AM.png</image:loc><image:caption>SCMagazinelogoDec14202103143683AM</image:caption><image:title>SCMagazinelogoDec14202103143683AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/three-issues-from-fbi-director-comeys-cybersecurity-speech-boston-companies-are-already-working-on</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Boston-Business-Journal.jpg</image:loc><image:caption>BostonBusinessJournal</image:caption><image:title>BostonBusinessJournal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/nasty-malware-steals-banking-passwords-and-2fa-codes</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Kim%20Komando%20Logo.jpg</image:loc><image:caption>KimKomandoLogo</image:caption><image:title>KimKomandoLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/resources/the-seven-struggles-of-detection-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Insights/Whitepapers/Ebook_Seven-Signs_Thumb-NOshadow.png</image:loc><image:caption>EbookSevenSignsThumbNOshadow</image:caption><image:title>EbookSevenSignsThumbNOshadow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-01-13</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alert-new-trickbot-variants</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/top-cybersecurity-startups-from-around-the-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Medici%20logo.png</image:loc><image:caption>Medicilogo</image:caption><image:title>Medicilogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2019-07-19</lastmod></url><url><loc>https://www.cybereason.com/blog/introducing-cybereason-mdr-mobile-app-the-power-of-the-soc-at-your-fingertips</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(112).png</image:loc><image:caption>blogposttext112</image:caption><image:title>blogposttext112</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Aug-04-2022-04-34-45-51-PM.png</image:loc><image:caption>image1Aug04202204344551PM</image:caption><image:title>image1Aug04202204344551PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-05T074007.547.png</image:loc><image:caption>blogposttext20220805T074007547</image:caption><image:title>blogposttext20220805T074007547</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(68).png</image:loc><image:caption>blogposttext68</image:caption><image:title>blogposttext68</image:title></image:image><lastmod>2022-08-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-hollywood-con-queen-pt1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-248-Card.png</image:loc><image:caption>MLEp248Card</image:caption><image:title>MLEp248Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Gregory-Mandarano.jpg</image:loc><image:caption>GregoryMandarano</image:caption><image:title>GregoryMandarano</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-247-Card.png</image:loc><image:caption>MLEp247Card</image:caption><image:title>MLEp247Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><lastmod>2024-08-27</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-fpt-software-partner-to-protect-organizations-from-sophisticated-cyber-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-09-27</lastmod></url><url><loc>https://www.cybereason.com/blog/distributed-machine-learning-models-done-right</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/nfts-disappear-mlbside-ep-207.png</image:loc><image:caption>nftsdisappearmlbsideep207</image:caption><image:title>nftsdisappearmlbsideep207</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(89).png</image:loc><image:caption>blogposttext89</image:caption><image:title>blogposttext89</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/T03CSH6QK-U4ESR8KN2-194b6f22d2f8-512.jpg</image:loc><image:caption>T03CSH6QKU4ESR8KN2194b6f22d2f8512</image:caption><image:title>T03CSH6QKU4ESR8KN2194b6f22d2f8512</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Apr-26-2022-06-06-08-38-PM.png</image:loc><image:caption>image1Apr26202206060838PM</image:caption><image:title>image1Apr26202206060838PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Apr-26-2022-06-07-04-49-PM.png</image:loc><image:caption>image2Apr26202206070449PM</image:caption><image:title>image2Apr26202206070449PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-04-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-experts-ransomware-hackers-likely-to-hit-during-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hearst%20Television%20log-1.png</image:loc><image:caption>HearstTelevisionlog1</image:caption><image:title>HearstTelevisionlog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/solarwinds-attacks-highlight-importance-of-operation-centric-approach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/solarwinds-operation-centric-blog-card.png</image:loc><image:caption>solarwindsoperationcentricblogcard</image:caption><image:title>solarwindsoperationcentricblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/what-cyber-security-can-learn-from-japanese-martial-arts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20img%20lummastealer-1.png</image:loc><image:caption>blogimglummastealer1</image:caption><image:title>blogimglummastealer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Uri%20Sternfeld.jpeg</image:loc><image:caption>UriSternfeld</image:caption><image:title>UriSternfeld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_218646658-1-1000x391.jpg</image:loc><image:caption>shutterstock21864665811000x391</image:caption><image:title>shutterstock21864665811000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(11).png</image:loc><image:caption>BLOGImagesTemplatev211</image:caption><image:title>BLOGImagesTemplatev211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/consulting/incident-response-retainer</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cloud-platform-images.png</image:loc><image:caption>cloudplatformimages</image:caption><image:title>cloudplatformimages</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-spine-bg--posture-incident-management-d.jpg</image:loc><image:caption>crplatformspinebgpostureincidentmanagementd</image:caption><image:title>crplatformspinebgpostureincidentmanagementd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/derek-rieck.png</image:loc><image:caption>derekrieck</image:caption><image:title>derekrieck</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-attack-sim-hero-preventid-2000px.jpg</image:loc><image:caption>crattacksimheropreventid2000px</image:caption><image:title>crattacksimheropreventid2000px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/michael-quinn.webp</image:loc><image:caption>michaelquinn</image:caption><image:title>michaelquinn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/incident-response-static-web-image.png</image:loc><image:caption>incidentresponsestaticwebimage</image:caption><image:title>incidentresponsestaticwebimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ben-demonte.jpg</image:loc><image:caption>bendemonte</image:caption><image:title>bendemonte</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(36).png</image:loc><image:caption>BLOGImagesTemplatev236</image:caption><image:title>BLOGImagesTemplatev236</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/denman-headshot.png</image:loc><image:caption>denmanheadshot</image:caption><image:title>denmanheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-hero-protector-with-hex-bg.png</image:loc><image:caption>crheroprotectorwithhexbg</image:caption><image:title>crheroprotectorwithhexbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase__mobile-group-preventid.png</image:loc><image:caption>crowlshowcasemobilegrouppreventid</image:caption><image:title>crowlshowcasemobilegrouppreventid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tech-agnostic-incident-response-1.png</image:loc><image:caption>Techagnosticincidentresponse1</image:caption><image:title>Techagnosticincidentresponse1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/REPORT_CR_ICONS-41.svg</image:loc><image:caption>REPORTCRICONS41</image:caption><image:title>REPORTCRICONS41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/DEPLOY_CR_ICONS-07.png</image:loc><image:caption>DEPLOYCRICONS07</image:caption><image:title>DEPLOYCRICONS07</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DurrantProfilePic2025.png</image:loc><image:caption>DurrantProfilePic2025</image:caption><image:title>DurrantProfilePic2025</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR2_CR_ICONS-11.png</image:loc><image:caption>EDR2CRICONS11</image:caption><image:title>EDR2CRICONS11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Mitre%20Blog%202026.png</image:loc><image:caption>CybereasonMitreBlog2026</image:caption><image:title>CybereasonMitreBlog2026</image:title></image:image><lastmod>2025-06-04</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-xdr-dubbed-hottest-new-cybersecurity-product-by-crn</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/soc-dash-23-ram-featured-image.png</image:loc><image:caption>socdash23ramfeaturedimage</image:caption><image:title>socdash23ramfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Featured%20Images%20(1).png</image:loc><image:caption>BlogFeaturedImages1</image:caption><image:title>BlogFeaturedImages1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-announces-deep-hunting-tour</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/businesses-worried-about-cyberattacks-during-the-holidays-report-finds</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CBS%20News%20logo-2.jpg</image:loc><image:caption>CBSNewslogo2</image:caption><image:title>CBSNewslogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-11-18</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-vs-egregor-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-1.png</image:loc><image:caption>egregor1</image:caption><image:title>egregor1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-5.png</image:loc><image:caption>egregor5</image:caption><image:title>egregor5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-9.png</image:loc><image:caption>egregor9</image:caption><image:title>egregor9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-4.jpg</image:loc><image:caption>egregor4</image:caption><image:title>egregor4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-3.png</image:loc><image:caption>egregor3</image:caption><image:title>egregor3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-8.png</image:loc><image:caption>egregor8</image:caption><image:title>egregor8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-2.png</image:loc><image:caption>egregor2</image:caption><image:title>egregor2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/anydesk-breach-blog-featured.png</image:loc><image:caption>anydeskbreachblogfeatured</image:caption><image:title>anydeskbreachblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-10.png</image:loc><image:caption>egregor10</image:caption><image:title>egregor10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-12.png</image:loc><image:caption>egregor12</image:caption><image:title>egregor12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-6.png</image:loc><image:caption>egregor6</image:caption><image:title>egregor6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-blog-card.png</image:loc><image:caption>egregorblogcard</image:caption><image:title>egregorblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-11.png</image:loc><image:caption>egregor11</image:caption><image:title>egregor11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(17).png</image:loc><image:caption>BLOGImagesTemplatev217</image:caption><image:title>BLOGImagesTemplatev217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-13.png</image:loc><image:caption>egregor13</image:caption><image:title>egregor13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/egregor-7.png</image:loc><image:caption>egregor7</image:caption><image:title>egregor7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-08-10</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-recognized-in-2025-gartner-dfir-retainer-market-guide</loc><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(25).png</image:loc><image:caption>BLOGImagesTemplatev225</image:caption><image:title>BLOGImagesTemplatev225</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2025-07-30</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-story-of-l0pht-p1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Christien%20Rioux.png</image:loc><image:caption>ChristienRioux</image:caption><image:title>ChristienRioux</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/joe%20grand-2.png</image:loc><image:caption>joegrand2</image:caption><image:title>joegrand2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cris%20thomas-1.png</image:loc><image:caption>cristhomas1</image:caption><image:title>cristhomas1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/chris%20wysopal.png</image:loc><image:caption>chriswysopal</image:caption><image:title>chriswysopal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/104%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>104MALICIOUSLIFE</image:caption><image:title>104MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/john%20lester.png</image:loc><image:caption>johnlester</image:caption><image:title>johnlester</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/2024-Cybersecurity-Predictions%20-%20Generative-GD-Featured.png</image:loc><image:caption>2024CybersecurityPredictionsGenerativeGDFeatured</image:caption><image:title>2024CybersecurityPredictionsGenerativeGDFeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/xdr-the-key-to-empowering-your-soc</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(73).png</image:loc><image:caption>blogposttext73</image:caption><image:title>blogposttext73</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/XDR.png</image:loc><image:caption>XDR</image:caption><image:title>XDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(2).png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-02-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/most-ransomware-victims-who-pay-up-just-get-attacked-again</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRadar%20logo-3.png</image:loc><image:caption>TechRadarlogo3</image:caption><image:title>TechRadarlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/bad-rabbit-how-to-protect-yourself-from-the-ransomware-attack-sweeping-across-europe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Yahoo!%20News.png</image:loc><image:caption>YahooNews</image:caption><image:title>YahooNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/industry-reactions-to-shadow-brokers-leak-feedback-friday</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-cyber-ptsd</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jason%20Hong.jpg</image:loc><image:caption>JasonHong</image:caption><image:title>JasonHong</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(1).png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Catherine%20Knibbs.jpeg</image:loc><image:caption>CatherineKnibbs</image:caption><image:title>CatherineKnibbs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><lastmod>2022-03-22</lastmod></url><url><loc>https://www.cybereason.com/resources/follett-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/follet-case-study-thumbnail.png</image:loc><image:caption>folletcasestudythumbnail</image:caption><image:title>folletcasestudythumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-11-11</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-february-3rd-2022-live-attack-simulation-ransomware-threat-hunter-series</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(7).png</image:loc><image:caption>CybereasonBlogTemplate7</image:caption><image:title>CybereasonBlogTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jj-hex-hs2.png</image:loc><image:caption>jjhexhs2</image:caption><image:title>jjhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Headshot%20image%20template%20(6)-1.webp</image:loc><image:caption>CopyofHeadshotimagetemplate61</image:caption><image:title>CopyofHeadshotimagetemplate61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/webinar.png</image:loc><image:caption>webinar</image:caption><image:title>webinar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-01-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hbo-hack-here-are-some-expert-theories-on-how-and-why-it-happened</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/International-Business-Times.png</image:loc><image:caption>InternationalBusinessTimes</image:caption><image:title>InternationalBusinessTimes</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/german-ransomware-attack-a-rallying-cry-for-bullish-diligence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/German-Ambulance-Blur.jpg</image:loc><image:caption>GermanAmbulanceBlur</image:caption><image:title>GermanAmbulanceBlur</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(23).png</image:loc><image:caption>CybereasonBlogTemplate23</image:caption><image:title>CybereasonBlogTemplate23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-series-a-story-in-boston-tech-270m-invested-in-past-year</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/conomy.jpg</image:loc><image:caption>conomy</image:caption><image:title>conomy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hack-friday-how-to-avoid-five-major-cybersecurity-risk</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/forbes-logo-3.gif</image:loc><image:caption>forbeslogo3</image:caption><image:title>forbeslogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-12-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-encryption-debate</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/EM360.png</image:loc><image:caption>EM360</image:caption><image:title>EM360</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-insights-five-emerging-threats-that-enterprise-security-must-not-ignore</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_101436343-1000x391.jpg</image:loc><image:caption>shutterstock1014363431000x391</image:caption><image:title>shutterstock1014363431000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/what-are-malops</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-12-1024x391.png</image:loc><image:caption>Untitleddesign121024x391</image:caption><image:title>Untitleddesign121024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T093119.758.png</image:loc><image:caption>blogposttext20220830T093119758</image:caption><image:title>blogposttext20220830T093119758</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(124).png</image:loc><image:caption>blogposttext124</image:caption><image:title>blogposttext124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><lastmod>2021-07-20</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs.-ryuk-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ryuk-ransomware-illus.png</image:loc><image:caption>ryukransomwareillus</image:caption><image:title>ryukransomwareillus</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ryuk-blog-2.png</image:loc><image:caption>ryukblog2</image:caption><image:title>ryukblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Joakim%20Kandefelt.png</image:loc><image:caption>JoakimKandefelt</image:caption><image:title>JoakimKandefelt</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ryuk-blog-1.png</image:loc><image:caption>ryukblog1</image:caption><image:title>ryukblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ryuk-blog-3.png</image:loc><image:caption>ryukblog3</image:caption><image:title>ryukblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-05-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-offers-log4j-vaccine-for-systems-that-cant-be-updated-immediately</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo-Dec-14-2021-03-20-26-32-AM.png</image:loc><image:caption>ZDNetlogoDec14202103202632AM</image:caption><image:title>ZDNetlogoDec14202103202632AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/unicef-data-breach-handling-draws-praise-but-dire-need-for-better-security-culture-remains</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict-Logo-8.jpg</image:loc><image:caption>VerdictLogo8</image:caption><image:title>VerdictLogo8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-discloses-attack-vector-used-by-chinese-cybergang-to-steal-ip</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Boulevard%20logo-3.png</image:loc><image:caption>SecurityBoulevardlogo3</image:caption><image:title>SecurityBoulevardlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinese-speaking-hackers-increase-activity-and-diversify-cyberattack-methods</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRadar%20logo.png</image:loc><image:caption>TechRadarlogo</image:caption><image:title>TechRadarlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-08-06</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-alert-microsoft-mshtml-remote-code-execution-vulnerability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-10-2021-06-38-08-76-PM.png</image:loc><image:caption>unnamedSep10202106380876PM</image:caption><image:title>unnamedSep10202106380876PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis.png</image:loc><image:caption>CopyofThreatAlertAnalysis</image:caption><image:title>CopyofThreatAlertAnalysis</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-2.jpg</image:loc><image:caption>unnamed2</image:caption><image:title>unnamed2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-21T133543.854.png</image:loc><image:caption>blogposttext20220621T133543854</image:caption><image:title>blogposttext20220621T133543854</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T113003.246.png</image:loc><image:caption>blogposttext20221003T113003246</image:caption><image:title>blogposttext20221003T113003246</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-04-11</lastmod></url><url><loc>https://www.cybereason.com/threat-alert-multi-stage-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-impacted-geo.png</image:loc><image:caption>criconimpactedgeo</image:caption><image:title>criconimpactedgeo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-badge-orange.png</image:loc><image:caption>threatalertbadgeorange</image:caption><image:title>threatalertbadgeorange</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/icons-all/Asset%201077.png</image:loc><image:caption>Asset1077</image:caption><image:title>Asset1077</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-remediate-disable.png</image:loc><image:caption>criconremediatedisable</image:caption><image:title>criconremediatedisable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-hero-bg.jpg</image:loc><image:caption>threatalertherobg</image:caption><image:title>threatalertherobg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-attack-goal.png</image:loc><image:caption>criconattackgoal</image:caption><image:title>criconattackgoal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-threat-type.png</image:loc><image:caption>criconthreattype</image:caption><image:title>criconthreattype</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/icons-all/Asset%203.png</image:loc><image:caption>Asset3</image:caption><image:title>Asset3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner-Page-Icons-03.png</image:loc><image:caption>PartnerPageIcons03</image:caption><image:title>PartnerPageIcons03</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sc-magazine-video-interview-with-cybereason-ciso-israel-barak</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hack-attack-how-to-check-if-youve-been-exposed-by-collections-mega-hack-that-leaked-2billion-email-addresses</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Sun.png</image:loc><image:caption>TheSun</image:caption><image:title>TheSun</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2019-02-14</lastmod></url><url><loc>https://www.cybereason.com/blog/latest-soc-survey-anticipates-shift-toward-mdr-and-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20MDR.png</image:loc><image:caption>CybereasonMDR</image:caption><image:title>CybereasonMDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/olist-cybereason-mdr.png</image:loc><image:caption>olistcybereasonmdr</image:caption><image:title>olistcybereasonmdr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(106).png</image:loc><image:caption>blogposttext106</image:caption><image:title>blogposttext106</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20MDR%20methodology.png</image:loc><image:caption>CybereasonMDRmethodology</image:caption><image:title>CybereasonMDRmethodology</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20SANS%20SOC%20Survey.png</image:loc><image:caption>CybereasonSANSSOCSurvey</image:caption><image:title>CybereasonSANSSOCSurvey</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-02T092903.438.png</image:loc><image:caption>blogposttext20220602T092903438</image:caption><image:title>blogposttext20220602T092903438</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-06-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/brazilian-financial-malware-spreads-beyond-national-boundaries</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/securityweek-4.png</image:loc><image:caption>securityweek4</image:caption><image:title>securityweek4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-12-03</lastmod></url><url><loc>https://www.cybereason.com/resources/motorola-mobility-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/motorola-mobility-cs-featured.png</image:loc><image:caption>motorolamobilitycsfeatured</image:caption><image:title>motorolamobilitycsfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-are-targeting-other-hackers-by-infecting-their-tools-with-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechCrunch%20logo-3.png</image:loc><image:caption>TechCrunchlogo3</image:caption><image:title>TechCrunchlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/blog/collecting-data-like-no-other-cybereason-endpoint-silent-sensor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-city-eyes--bw-min.jpg</image:loc><image:caption>crbgcityeyesbwmin</image:caption><image:title>crbgcityeyesbwmin</image:title></image:image><lastmod>2022-05-16</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-reddit-ama-sharing-experience</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Eliad%20Kimhy.jpg</image:loc><image:caption>EliadKimhy</image:caption><image:title>EliadKimhy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(3)-2.png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/reddit1.png</image:loc><image:caption>reddit1</image:caption><image:title>reddit1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-cities-ramp-up-security-in-wake-of-killing-of-irans-top-general-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ABC%20News.jpg</image:loc><image:caption>ABCNews</image:caption><image:title>ABCNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-01-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/panasonic-breached-again-conti-takes-responsibility</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-May-09-2022-03-32-51-51-PM.png</image:loc><image:caption>DatabreachtodaylogoMay09202203325151PM</image:caption><image:title>DatabreachtodaylogoMay09202203325151PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-finalist-for-best-customer-service-award-in-the-2020-sc-awards-competition</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-01-15</lastmod></url><url><loc>https://www.cybereason.com/resources/top-ten-use-cases-for-mobile-threat-detection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/top-ten-mobile-ucs-hero-B.png</image:loc><image:caption>toptenmobileucsheroB</image:caption><image:title>toptenmobileucsheroB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2020-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/product/how-cybereason-xdr-supports-zero-trust-initiatives</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zerotrust.png</image:loc><image:caption>zerotrust</image:caption><image:title>zerotrust</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-and-zero-trust.jpg</image:loc><image:caption>cybereasonandzerotrust</image:caption><image:title>cybereasonandzerotrust</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Future%20SOC%20Effectiveness.png</image:loc><image:caption>FutureSOCEffectiveness</image:caption><image:title>FutureSOCEffectiveness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10XThreat.png</image:loc><image:caption>10XThreat</image:caption><image:title>10XThreat</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/services/active-monitoring</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ServiceSubPageHeader3.png</image:loc><image:caption>ServiceSubPageHeader3</image:caption><image:title>ServiceSubPageHeader3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/platform-bg-shape-sm.png</image:loc><image:caption>platformbgshapesm</image:caption><image:title>platformbgshapesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2019-01-04</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-doing-security-before-security-was-career-path</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/petri%20kuivala.png</image:loc><image:caption>petrikuivala</image:caption><image:title>petrikuivala</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-CareerPath-blog.png</image:loc><image:caption>CISOCareerPathblog</image:caption><image:title>CISOCareerPathblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-09-21</lastmod></url><url><loc>https://www.cybereason.com/blog/busted-taking-down-ransomware-attackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/10biggest.png</image:loc><image:caption>10biggest</image:caption><image:title>10biggest</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(20).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews20</image:caption><image:title>CopyofBLOGSOCIALSETNews20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(14).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews14</image:caption><image:title>CopyofBLOGSOCIALSETNews14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/our-thoughts-on-lastpass-breach-and-password-hygiene</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/dreamstime_l_53759493-1024x391.jpg</image:loc><image:caption>dreamstimel537594931024x391</image:caption><image:title>dreamstimel537594931024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(9).png</image:loc><image:caption>MaliciousLifeepisode9</image:caption><image:title>MaliciousLifeepisode9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/increase-in-remote-work-spurs-demand-for-edr-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/sean-mooney-hs.jpg</image:loc><image:caption>seanmooneyhs</image:caption><image:title>seanmooneyhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Laptop-Burning-Blog.png</image:loc><image:caption>LaptopBurningBlog</image:caption><image:title>LaptopBurningBlog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xdr-castle-sky-blog.png</image:loc><image:caption>xdrcastleskyblog</image:caption><image:title>xdrcastleskyblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cybereason-sdr-evolution-blog-featured-2.png</image:loc><image:caption>cybereasonsdrevolutionblogfeatured2</image:caption><image:title>cybereasonsdrevolutionblogfeatured2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-the-colonoscopy-of-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-Colonoscopy-blog.png</image:loc><image:caption>CISOColonoscopyblog</image:caption><image:title>CISOColonoscopyblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories%20(1).png</image:loc><image:caption>CISOStories1</image:caption><image:title>CISOStories1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200-Mar-25-2021-09-42-40-94-AM.png</image:loc><image:caption>pastedimage0Mar25202109424094AM</image:caption><image:title>pastedimage0Mar25202109424094AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-09-21</lastmod></url><url><loc>https://www.cybereason.com/blog/2-metrics-to-evaluate-mitre-attck-results</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Figure%202%20Correlation.png</image:loc><image:caption>Figure2Correlation</image:caption><image:title>Figure2Correlation</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Attack_Lifecycle-Blog.png</image:loc><image:caption>AttackLifecycleBlog</image:caption><image:title>AttackLifecycleBlog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Figure%201%20MTTR.png</image:loc><image:caption>Figure1MTTR</image:caption><image:title>Figure1MTTR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ross-rustici-north-korean-cyber-attacks-unlikely-to-cease-despite-proposed-trump-meeting</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fed%20News%20Radio-1.jpg</image:loc><image:caption>FedNewsRadio1</image:caption><image:title>FedNewsRadio1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-03-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-how-to-defend-a-bank-pt.-ii-right-of-bang</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/70%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>70MALICIOUSLIFE</image:caption><image:title>70MALICIOUSLIFE</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-the-eight-steps-to-threat-hunting</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/8-steps-hunting-banner.png</image:loc><image:caption>8stepshuntingbanner</image:caption><image:title>8stepshuntingbanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-06-22</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-bloody-origins-of-israels-cybersecurity-industry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-01-31</lastmod></url><url><loc>https://www.cybereason.com/resources/3-ways-to-enhance-your-security-posture-with-the-mitre-attack-framework</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Enhance-Security-Posture-Banner-Resources.png</image:loc><image:caption>EnhanceSecurityPostureBannerResources</image:caption><image:title>EnhanceSecurityPostureBannerResources</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2020-08-04</lastmod></url><url><loc>https://www.cybereason.com/blog/why-telemetry-correlations-are-essential-to-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(22).png</image:loc><image:caption>blogposttext22</image:caption><image:title>blogposttext22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-2.png</image:loc><image:caption>CybereasonBlogTemplate52</image:caption><image:title>CybereasonBlogTemplate52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(3).png</image:loc><image:caption>ImagefromiOS3</image:caption><image:title>ImagefromiOS3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-03-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/prepare-but-dont-panic-over-supposed-russian-cyber-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-Jan-29-2022-03-35-09-57-PM.png</image:loc><image:caption>ComputerWeeklylogoJan29202203350957PM</image:caption><image:title>ComputerWeeklylogoJan29202203350957PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-warns-global-organizations-about-the-rise-in-gootloader-infections</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-02-08</lastmod></url><url><loc>https://www.cybereason.com/blog/spear-phishing-a-technical-case-study-for-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(20).png</image:loc><image:caption>blogposttext20</image:caption><image:title>blogposttext20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(115).png</image:loc><image:caption>blogposttext115</image:caption><image:title>blogposttext115</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(72).png</image:loc><image:caption>blogposttext72</image:caption><image:title>blogposttext72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><lastmod>2023-04-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-ransomware-attack-hits-russia-and-spreads-around-globe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CNN.png</image:loc><image:caption>CNN</image:caption><image:title>CNN</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-advens-partner-to-bring-new-advanced-security-services-to-the-french-market</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-selected-as-finalist-for-rsa-conference-innovation-sandbox-contest-2015</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-2.png</image:loc><image:caption>CybereasonBlogTemplate152</image:caption><image:title>CybereasonBlogTemplate152</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(11).png</image:loc><image:caption>BLOGImagesTemplatev211</image:caption><image:title>BLOGImagesTemplatev211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-hackers-vs.-spies-the-stratfor-leaks-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(12).png</image:loc><image:caption>MaliciousLifeepisode12</image:caption><image:title>MaliciousLifeepisode12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(9).png</image:loc><image:caption>MaliciousLifeepisode9</image:caption><image:title>MaliciousLifeepisode9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><lastmod>2022-06-17</lastmod></url><url><loc>https://www.cybereason.com/blog/the-advantages-of-endpoint-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_276350468-1000x391.jpg</image:loc><image:caption>shutterstock2763504681000x391</image:caption><image:title>shutterstock2763504681000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-live-ransomware-attack-simulation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94).png</image:loc><image:caption>blogposttext94</image:caption><image:title>blogposttext94</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20%20SOCIAL%20SET%20-%20Webinar.png</image:loc><image:caption>BLOGSOCIALSETWebinar</image:caption><image:title>BLOGSOCIALSETWebinar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(102).png</image:loc><image:caption>blogposttext102</image:caption><image:title>blogposttext102</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jj-hex-hs2.png</image:loc><image:caption>jjhexhs2</image:caption><image:title>jjhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/international-womens-day-defenders-share-advice-on-how-to-breakthebias</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-Apr-03-2022-10-44-38-33-PM.png</image:loc><image:caption>MSSPAlertlogoApr03202210443833PM</image:caption><image:title>MSSPAlertlogoApr03202210443833PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-04-03</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-alert-the-return-of-emotet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Dec-09-2021-07-46-05-20-PM.png</image:loc><image:caption>image7Dec09202107460520PM</image:caption><image:title>image7Dec09202107460520PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Dec-09-2021-07-44-54-27-PM.png</image:loc><image:caption>image4Dec09202107445427PM</image:caption><image:title>image4Dec09202107445427PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Dec-09-2021-07-42-45-47-PM.png</image:loc><image:caption>image5Dec09202107424547PM</image:caption><image:title>image5Dec09202107424547PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Dec-09-2021-07-45-40-80-PM.png</image:loc><image:caption>image6Dec09202107454080PM</image:caption><image:title>image6Dec09202107454080PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-4.jpg</image:loc><image:caption>image114</image:caption><image:title>image114</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Dec-09-2021-07-43-12-64-PM.png</image:loc><image:caption>image9Dec09202107431264PM</image:caption><image:title>image9Dec09202107431264PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Dec-09-2021-07-44-19-28-PM.png</image:loc><image:caption>image8Dec09202107441928PM</image:caption><image:title>image8Dec09202107441928PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Dec-09-2021-07-37-37-10-PM.png</image:loc><image:caption>image1Dec09202107373710PM</image:caption><image:title>image1Dec09202107373710PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Dec-09-2021-07-46-59-94-PM.png</image:loc><image:caption>image3Dec09202107465994PM</image:caption><image:title>image3Dec09202107465994PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CopyofCybereasonBlogHeroTemplate1</image:caption><image:title>CopyofCybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Dec-09-2021-07-38-19-21-PM.png</image:loc><image:caption>image10Dec09202107381921PM</image:caption><image:title>image10Dec09202107381921PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Dec-09-2021-07-46-38-18-PM.png</image:loc><image:caption>image12Dec09202107463818PM</image:caption><image:title>image12Dec09202107463818PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Dec-09-2021-07-40-05-85-PM.png</image:loc><image:caption>image2Dec09202107400585PM</image:caption><image:title>image2Dec09202107400585PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(33).png</image:loc><image:caption>blogposttext33</image:caption><image:title>blogposttext33</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-malicious-campaign-is-lurking-under-the-surface</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cyberwire%20logo.png</image:loc><image:caption>Cyberwirelogo</image:caption><image:title>Cyberwirelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-08-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/pfizer-data-breach-exposes-prescription-phone-call-transcripts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict%20logo-2.png</image:loc><image:caption>Verdictlogo2</image:caption><image:title>Verdictlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-10-28</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-follina/msdt-microsoft-office-vulnerability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Jun-21-2022-07-16-57-01-PM.png</image:loc><image:caption>image6Jun21202207165701PM</image:caption><image:title>image6Jun21202207165701PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Jun-21-2022-07-19-30-72-PM.png</image:loc><image:caption>image3Jun21202207193072PM</image:caption><image:title>image3Jun21202207193072PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Jun-21-2022-07-17-34-12-PM.png</image:loc><image:caption>image4Jun21202207173412PM</image:caption><image:title>image4Jun21202207173412PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-2.jpg</image:loc><image:caption>image72</image:caption><image:title>image72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(16).png</image:loc><image:caption>BLOGImagesTemplatev216</image:caption><image:title>BLOGImagesTemplatev216</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(1).png</image:loc><image:caption>BLOGImagesTemplatev21</image:caption><image:title>BLOGImagesTemplatev21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Jun-21-2022-07-16-15-53-PM.png</image:loc><image:caption>image5Jun21202207161553PM</image:caption><image:title>image5Jun21202207161553PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-21T133543.854.png</image:loc><image:caption>blogposttext20220621T133543854</image:caption><image:title>blogposttext20220621T133543854</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Jun-21-2022-07-18-54-64-PM.png</image:loc><image:caption>image2Jun21202207185464PM</image:caption><image:title>image2Jun21202207185464PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Jun-21-2022-07-15-42-51-PM.png</image:loc><image:caption>image1Jun21202207154251PM</image:caption><image:title>image1Jun21202207154251PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-06-22</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/eric-sun</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CTF-Blog-Announcement.jpg</image:loc><image:caption>CTFBlogAnnouncement</image:caption><image:title>CTFBlogAnnouncement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MITRE-R3-blog-image.png</image:loc><image:caption>MITRER3blogimage</image:caption><image:title>MITRER3blogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eric-sun-hs.jpg</image:loc><image:caption>ericsunhs</image:caption><image:title>ericsunhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/esg-xdr-hero-01.png</image:loc><image:caption>esgxdrhero01</image:caption><image:title>esgxdrhero01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(9).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews9</image:caption><image:title>CopyofBLOGSOCIALSETNews9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xdr-castle-sky-blog.png</image:loc><image:caption>xdrcastleskyblog</image:caption><image:title>xdrcastleskyblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-notpetyas-fiscal-impact-592-5-million-and-growing</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(20).png</image:loc><image:caption>MaliciousLifeepisode20</image:caption><image:title>MaliciousLifeepisode20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(3)-2.png</image:loc><image:caption>CISOStoriestemplate32</image:caption><image:title>CISOStoriestemplate32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-62.jpg</image:loc><image:caption>Untitleddesign62</image:caption><image:title>Untitleddesign62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-25</lastmod></url><url><loc>https://www.cybereason.com/blog/the-state-of-ransomware-in-the-public-sector</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(13).png</image:loc><image:caption>blogposttext13</image:caption><image:title>blogposttext13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/publicsector.png</image:loc><image:caption>publicsector</image:caption><image:title>publicsector</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-27T072602.816.png</image:loc><image:caption>blogposttext20220727T072602816</image:caption><image:title>blogposttext20220727T072602816</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-01-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-rolls-out-pay-as-you-grow-program-for-mssp-partners</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Futures-Jan-29-2022-02-57-30-37-PM.png</image:loc><image:caption>ChannelFuturesJan29202202573037PM</image:caption><image:title>ChannelFuturesJan29202202573037PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/north-korea-accused-of-stealing-bitcoin-to-bolster-finances</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/securityweek.jpg</image:loc><image:caption>securityweek</image:caption><image:title>securityweek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/how-i-made-my-companys-office-into-a-fancy-internet-cafe-and-why-should-you-too</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Sliver%20C2-1.png</image:loc><image:caption>SliverC21</image:caption><image:title>SliverC21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR-Office-Blog-Hero.png</image:loc><image:caption>CROfficeBlogHero</image:caption><image:title>CROfficeBlogHero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Shlomi.jpg</image:loc><image:caption>Shlomi</image:caption><image:title>Shlomi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(7).png</image:loc><image:caption>BLOGImagesTemplatev27</image:caption><image:title>BLOGImagesTemplatev27</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs.-lockbit2.0-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-17-37-41-PM.png</image:loc><image:caption>unnamedAug20202104173741PM</image:caption><image:title>unnamedAug20202104173741PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-09-57-92-PM.png</image:loc><image:caption>unnamedAug20202104095792PM</image:caption><image:title>unnamedAug20202104095792PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-19-50-13-PM.png</image:loc><image:caption>unnamedAug20202104195013PM</image:caption><image:title>unnamedAug20202104195013PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-21-45-91-PM.png</image:loc><image:caption>unnamedAug20202104214591PM</image:caption><image:title>unnamedAug20202104214591PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-05-57-58-PM.png</image:loc><image:caption>unnamedAug20202104055758PM</image:caption><image:title>unnamedAug20202104055758PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-11-19-84-PM.png</image:loc><image:caption>unnamedAug20202104111984PM</image:caption><image:title>unnamedAug20202104111984PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-13-32-72-PM.png</image:loc><image:caption>unnamedAug20202104133272PM</image:caption><image:title>unnamedAug20202104133272PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-14-33-01-PM.png</image:loc><image:caption>unnamedAug20202104143301PM</image:caption><image:title>unnamedAug20202104143301PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-06-49-79-PM.png</image:loc><image:caption>unnamedAug20202104064979PM</image:caption><image:title>unnamedAug20202104064979PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-01-46-18-PM.png</image:loc><image:caption>unnamedAug20202104014618PM</image:caption><image:title>unnamedAug20202104014618PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-05-00-12-PM.png</image:loc><image:caption>unnamedAug20202104050012PM</image:caption><image:title>unnamedAug20202104050012PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-08-44-62-PM.png</image:loc><image:caption>unnamedAug20202104084462PM</image:caption><image:title>unnamedAug20202104084462PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vs-ransomware.png</image:loc><image:caption>vsransomware</image:caption><image:title>vsransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-22-34-98-PM.png</image:loc><image:caption>unnamedAug20202104223498PM</image:caption><image:title>unnamedAug20202104223498PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T071524.894.png</image:loc><image:caption>blogposttext20220707T071524894</image:caption><image:title>blogposttext20220707T071524894</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20RYUK1.png</image:loc><image:caption>CopyofRYUK1</image:caption><image:title>CopyofRYUK1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-15-27-81-PM.png</image:loc><image:caption>unnamedAug20202104152781PM</image:caption><image:title>unnamedAug20202104152781PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-23-24-83-PM.png</image:loc><image:caption>unnamedAug20202104232483PM</image:caption><image:title>unnamedAug20202104232483PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-12-31-79-PM.png</image:loc><image:caption>unnamedAug20202104123179PM</image:caption><image:title>unnamedAug20202104123179PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-18-58-88-PM.png</image:loc><image:caption>unnamedAug20202104185888PM</image:caption><image:title>unnamedAug20202104185888PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-03-14-03-PM.png</image:loc><image:caption>unnamedAug20202104031403PM</image:caption><image:title>unnamedAug20202104031403PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Aug-20-2021-04-20-49-55-PM.png</image:loc><image:caption>unnamedAug20202104204955PM</image:caption><image:title>unnamedAug20202104204955PM</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-cybersecurity-roi-necessary</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-ROI-blog.png</image:loc><image:caption>CISOROIblog</image:caption><image:title>CISOROIblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(4).png</image:loc><image:caption>CISOStoriespodcast4</image:caption><image:title>CISOStoriespodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/paul%20hypki.png</image:loc><image:caption>paulhypki</image:caption><image:title>paulhypki</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><lastmod>2021-09-21</lastmod></url><url><loc>https://www.cybereason.com/resources/ebook-ransomware-the-true-cost-to-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/ransomware-ebook-card.png</image:loc><image:caption>ransomwareebookcard</image:caption><image:title>ransomwareebookcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-07-29</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/cybereason-blue-team</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(123).png</image:loc><image:caption>blogposttext123</image:caption><image:title>blogposttext123</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T112617.289.png</image:loc><image:caption>blogposttext20221003T112617289</image:caption><image:title>blogposttext20221003T112617289</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-08-04</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-mobile-threat-defense-announcement</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-05-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-facebook-security-failure-put-600million-users-at-risk-of-being-hacked</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Sun.gif</image:loc><image:caption>TheSun</image:caption><image:title>TheSun</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-03-21</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-ranked-as-a-top-company-in-leadership-and-professional-development</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-08-01</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/cybereason-security-research-team</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/threat-analysis-lnk-files-featured-image.png</image:loc><image:caption>threatanalysislnkfilesfeaturedimage</image:caption><image:title>threatanalysislnkfilesfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-DJvu-variant-featured-image.png</image:loc><image:caption>threatalertDJvuvariantfeaturedimage</image:caption><image:title>threatalertDJvuvariantfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-inc-ransomware-featured-image.png</image:loc><image:caption>threatalertincransomwarefeaturedimage</image:caption><image:title>threatalertincransomwarefeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-03-03</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-named-to-2018-ai-100</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-20</lastmod></url><url><loc>https://www.cybereason.com/blog/tycoon-phishing-kit-analysis</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image19.png</image:loc><image:caption>image19</image:caption><image:title>image19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image11.png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image28.png</image:loc><image:caption>image28</image:caption><image:title>image28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image5.png</image:loc><image:caption>image5</image:caption><image:title>image5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/hema-hs.png</image:loc><image:caption>hemahs</image:caption><image:title>hemahs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image9.png</image:loc><image:caption>image9</image:caption><image:title>image9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image16.png</image:loc><image:caption>image16</image:caption><image:title>image16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image21.png</image:loc><image:caption>image21</image:caption><image:title>image21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image17.png</image:loc><image:caption>image17</image:caption><image:title>image17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image4.png</image:loc><image:caption>image4</image:caption><image:title>image4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image24.png</image:loc><image:caption>image24</image:caption><image:title>image24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image35.png</image:loc><image:caption>image35</image:caption><image:title>image35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(6).png</image:loc><image:caption>ThreatAlerttemplate6</image:caption><image:title>ThreatAlerttemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image29.png</image:loc><image:caption>image29</image:caption><image:title>image29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image10.png</image:loc><image:caption>image10</image:caption><image:title>image10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image30.png</image:loc><image:caption>image30</image:caption><image:title>image30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/BLOG_Images_Template_v2%20(27).png</image:loc><image:caption>BLOGImagesTemplatev227</image:caption><image:title>BLOGImagesTemplatev227</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(8).png</image:loc><image:caption>BLOGImagesTemplatev28</image:caption><image:title>BLOGImagesTemplatev28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image6.png</image:loc><image:caption>image6</image:caption><image:title>image6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image22.png</image:loc><image:caption>image22</image:caption><image:title>image22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image13.png</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image33.png</image:loc><image:caption>image33</image:caption><image:title>image33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image26.png</image:loc><image:caption>image26</image:caption><image:title>image26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image25.png</image:loc><image:caption>image25</image:caption><image:title>image25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image7.png</image:loc><image:caption>image7</image:caption><image:title>image7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image3.png</image:loc><image:caption>image3</image:caption><image:title>image3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image34.png</image:loc><image:caption>image34</image:caption><image:title>image34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image23.png</image:loc><image:caption>image23</image:caption><image:title>image23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image20.png</image:loc><image:caption>image20</image:caption><image:title>image20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image12.png</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image36.png</image:loc><image:caption>image36</image:caption><image:title>image36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image2.png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image1.png</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image27.png</image:loc><image:caption>image27</image:caption><image:title>image27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image15.png</image:loc><image:caption>image15</image:caption><image:title>image15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image14.png</image:loc><image:caption>image14</image:caption><image:title>image14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/image31.png</image:loc><image:caption>image31</image:caption><image:title>image31</image:title></image:image><lastmod>2025-11-03</lastmod></url><url><loc>https://www.cybereason.com/blog/implications-of-the-alleged-state-department-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(12).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews12</image:caption><image:title>CopyofBLOGSOCIALSETNews12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-08-24</lastmod></url><url><loc>https://www.cybereason.com/blog/security-telemetry-evolution-the-year-of-the-in-memory-graph</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-12T072834.369-1.png</image:loc><image:caption>blogposttext20221012T0728343691</image:caption><image:title>blogposttext20221012T0728343691</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(46).png</image:loc><image:caption>blogposttext46</image:caption><image:title>blogposttext46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T134705.705.png</image:loc><image:caption>blogposttext20220627T134705705</image:caption><image:title>blogposttext20220627T134705705</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-06-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uefi-driver-flaw-discovered-on-lenovo-and-hp-laptops-also-affects-gigabyte-motherboards</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/research/dropping-anchor-from-a-trickbot-infection-to-the-discovery-of-the-anchor-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-117.png</image:loc><image:caption>DroppingtheAnchor117</image:caption><image:title>DroppingtheAnchor117</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-119.png</image:loc><image:caption>DroppingtheAnchor119</image:caption><image:title>DroppingtheAnchor119</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-156.png</image:loc><image:caption>image156</image:caption><image:title>image156</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-144.png</image:loc><image:caption>DroppingtheAnchor144</image:caption><image:title>DroppingtheAnchor144</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-152.png</image:loc><image:caption>DroppingtheAnchor152</image:caption><image:title>DroppingtheAnchor152</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-136.png</image:loc><image:caption>DroppingtheAnchor136</image:caption><image:title>DroppingtheAnchor136</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-150.png</image:loc><image:caption>DroppingtheAnchor150</image:caption><image:title>DroppingtheAnchor150</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-124.png</image:loc><image:caption>DroppingtheAnchor124</image:caption><image:title>DroppingtheAnchor124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-147.png</image:loc><image:caption>DroppingtheAnchor147</image:caption><image:title>DroppingtheAnchor147</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/anchor-blog-root-cause.png</image:loc><image:caption>anchorblogrootcause</image:caption><image:title>anchorblogrootcause</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-163.png</image:loc><image:caption>DroppingtheAnchor163</image:caption><image:title>DroppingtheAnchor163</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-118.png</image:loc><image:caption>DroppingtheAnchor118</image:caption><image:title>DroppingtheAnchor118</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-154.png</image:loc><image:caption>image154</image:caption><image:title>image154</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-149.png</image:loc><image:caption>DroppingtheAnchor149</image:caption><image:title>DroppingtheAnchor149</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-127.png</image:loc><image:caption>DroppingtheAnchor127</image:caption><image:title>DroppingtheAnchor127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/milan-degraeve-0ztvUdH5b-A-unsplash.jpg</image:loc><image:caption>milandegraeve0ztvUdH5bAunsplash</image:caption><image:title>milandegraeve0ztvUdH5bAunsplash</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-128.png</image:loc><image:caption>DroppingtheAnchor128</image:caption><image:title>DroppingtheAnchor128</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-138.png</image:loc><image:caption>DroppingtheAnchor138</image:caption><image:title>DroppingtheAnchor138</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/anchor-blog-anatomy.png</image:loc><image:caption>anchorbloganatomy</image:caption><image:title>anchorbloganatomy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-149.png</image:loc><image:caption>image149</image:caption><image:title>image149</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/anchor-blog-injected.png</image:loc><image:caption>anchorbloginjected</image:caption><image:title>anchorbloginjected</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-132.png</image:loc><image:caption>DroppingtheAnchor132</image:caption><image:title>DroppingtheAnchor132</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-130.png</image:loc><image:caption>DroppingtheAnchor130</image:caption><image:title>DroppingtheAnchor130</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-168.png</image:loc><image:caption>DroppingtheAnchor168</image:caption><image:title>DroppingtheAnchor168</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-137.png</image:loc><image:caption>DroppingtheAnchor137</image:caption><image:title>DroppingtheAnchor137</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-146.png</image:loc><image:caption>DroppingtheAnchor146</image:caption><image:title>DroppingtheAnchor146</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-151.png</image:loc><image:caption>image151</image:caption><image:title>image151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-160.png</image:loc><image:caption>image160</image:caption><image:title>image160</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-157.png</image:loc><image:caption>image157</image:caption><image:title>image157</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-145.png</image:loc><image:caption>image145</image:caption><image:title>image145</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-155.png</image:loc><image:caption>image155</image:caption><image:title>image155</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-143.png</image:loc><image:caption>image143</image:caption><image:title>image143</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-159.png</image:loc><image:caption>image159</image:caption><image:title>image159</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-161.png</image:loc><image:caption>DroppingtheAnchor161</image:caption><image:title>DroppingtheAnchor161</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-141.png</image:loc><image:caption>DroppingtheAnchor141</image:caption><image:title>DroppingtheAnchor141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-148.png</image:loc><image:caption>DroppingtheAnchor148</image:caption><image:title>DroppingtheAnchor148</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-147.png</image:loc><image:caption>image147</image:caption><image:title>image147</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-144.png</image:loc><image:caption>image144</image:caption><image:title>image144</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-150.png</image:loc><image:caption>image150</image:caption><image:title>image150</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-134.png</image:loc><image:caption>DroppingtheAnchor134</image:caption><image:title>DroppingtheAnchor134</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-131.png</image:loc><image:caption>DroppingtheAnchor131</image:caption><image:title>DroppingtheAnchor131</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-142.png</image:loc><image:caption>DroppingtheAnchor142</image:caption><image:title>DroppingtheAnchor142</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-148.png</image:loc><image:caption>image148</image:caption><image:title>image148</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/anchor-blog-rundll.png</image:loc><image:caption>anchorblogrundll</image:caption><image:title>anchorblogrundll</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-120.png</image:loc><image:caption>DroppingtheAnchor120</image:caption><image:title>DroppingtheAnchor120</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-133.png</image:loc><image:caption>DroppingtheAnchor133</image:caption><image:title>DroppingtheAnchor133</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-158.png</image:loc><image:caption>image158</image:caption><image:title>image158</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-135.png</image:loc><image:caption>DroppingtheAnchor135</image:caption><image:title>DroppingtheAnchor135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-153.png</image:loc><image:caption>image153</image:caption><image:title>image153</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-121.png</image:loc><image:caption>DroppingtheAnchor121</image:caption><image:title>DroppingtheAnchor121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-146.png</image:loc><image:caption>image146</image:caption><image:title>image146</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dropping%20the%20Anchor-139.png</image:loc><image:caption>DroppingtheAnchor139</image:caption><image:title>DroppingtheAnchor139</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/why-not-detect-every-ttp-in-the-mitre-attck-framework</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dani-wood.png</image:loc><image:caption>daniwood</image:caption><image:title>daniwood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cloud-MITRE-Blog-1.png</image:loc><image:caption>CloudMITREBlog1</image:caption><image:title>CloudMITREBlog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-reason-you-dont-have-data-privacy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(30).png</image:loc><image:caption>MaliciousLifeepisode30</image:caption><image:title>MaliciousLifeepisode30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/reason-you-dont-have-data-privacy-ep-214.png</image:loc><image:caption>reasonyoudonthavedataprivacyep214</image:caption><image:title>reasonyoudonthavedataprivacyep214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Would%20Happen%20if%20CBS%20Got%20Hacked.png</image:loc><image:caption>WhatWouldHappenifCBSGotHacked</image:caption><image:title>WhatWouldHappenifCBSGotHacked</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/powerful-new-ddos-method-adds-extortion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/KrebsOnSecurity.jpg</image:loc><image:caption>KrebsOnSecurity</image:caption><image:title>KrebsOnSecurity</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-03-30</lastmod></url><url><loc>https://www.cybereason.com/press/ibm-security-x-force-and-cybereason-join-forces-to-discuss-current-state-of-incident-response-in-april-27-webinar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-04-26</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-wins-big-at-the-17th-annual-peoples-choice-podcast-awards</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pod4.png</image:loc><image:caption>pod4</image:caption><image:title>pod4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-thamar-reservoir.png</image:loc><image:caption>MaliciousLifeepisodethamarreservoir</image:caption><image:title>MaliciousLifeepisodethamarreservoir</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T082054.921.png</image:loc><image:caption>blogposttext20221003T082054921</image:caption><image:title>blogposttext20221003T082054921</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><lastmod>2022-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/seven-tips-for-shopping-safely-online-during-the-holiday-season</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(106).png</image:loc><image:caption>blogposttext106</image:caption><image:title>blogposttext106</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_524468791.jpg</image:loc><image:caption>shutterstock524468791</image:caption><image:title>shutterstock524468791</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason-private-infrastructure-protection-gartner-magic-quadrant.png</image:loc><image:caption>Cybereasonprivateinfrastructureprotectiongartnermagicquadrant</image:caption><image:title>Cybereasonprivateinfrastructureprotectiongartnermagicquadrant</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/yonatan-striem-amit</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Yonaton-Striem-Amit-HS.png</image:loc><image:caption>YonatonStriemAmitHS</image:caption><image:title>YonatonStriemAmitHS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog-Cloud-Native-EPP-B.png</image:loc><image:caption>BlogCloudNativeEPPB</image:caption><image:title>BlogCloudNativeEPPB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(19).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews19</image:caption><image:title>CopyofBLOGSOCIALSETNews19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WFH-Blog-B.png</image:loc><image:caption>WFHBlogB</image:caption><image:title>WFHBlogB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/top-ten-mobile-ucs-hero-B.png</image:loc><image:caption>toptenmobileucsheroB</image:caption><image:title>toptenmobileucsheroB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV_Image-1.jpg</image:loc><image:caption>NGAVImage1</image:caption><image:title>NGAVImage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereasons-sam-curry-discussing-facebooks-response-to-the-data-scandal-to-hit-the-company</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NECN%20logo-1.jpg</image:loc><image:caption>NECNlogo1</image:caption><image:title>NECNlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-03-26</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-recognized-in-2024-gartner-market-guide-for-digital-forensics-and-incident-response-retainer-services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-10-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/washington-state-has-been-hit-by-a-cyberattack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict%20logo.png</image:loc><image:caption>Verdictlogo</image:caption><image:title>Verdictlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-09-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/middle-east-phishing-attack-aims-malware-variants-at-political-figures</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CIO%20logo.png</image:loc><image:caption>CIOlogo</image:caption><image:title>CIOlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-brings-valuable-perspective-to-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes%20logo-1.png</image:loc><image:caption>Forbeslogo1</image:caption><image:title>Forbeslogo1</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-whistleblowers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>10MALICIOUSLIFE1</image:caption><image:title>10MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/blog/product/responding-to-multi-endpoint-threats-with-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Future%20SOC%20Effectiveness.png</image:loc><image:caption>FutureSOCEffectiveness</image:caption><image:title>FutureSOCEffectiveness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10XThreat.png</image:loc><image:caption>10XThreat</image:caption><image:title>10XThreat</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(4).png</image:loc><image:caption>blogposttext4</image:caption><image:title>blogposttext4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/resources/leverage-mitre-attack/webinar/us/080422</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/greg-day-webinar-on-demand-card.png</image:loc><image:caption>gregdaywebinarondemandcard</image:caption><image:title>gregdaywebinarondemandcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-08-29</lastmod></url><url><loc>https://www.cybereason.com/blog/life-liberty-and-the-pursuit-of-happiness-in-a-digital-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_349563746-1.jpg</image:loc><image:caption>shutterstock3495637461</image:caption><image:title>shutterstock3495637461</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-to-protect-yourself-from-iphone-and-mac-security-flaw</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSN%20logo-Aug-23-2022-11-55-19-24-PM.png</image:loc><image:caption>MSNlogoAug23202211551924PM</image:caption><image:title>MSNlogoAug23202211551924PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-08-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-operation-aurora-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/55%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>55MALICIOUSLIFE</image:caption><image:title>55MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(26).png</image:loc><image:caption>MaliciousLifeepisode26</image:caption><image:title>MaliciousLifeepisode26</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/consulting/experts/ben-demonte</loc><lastmod>2025-08-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-how-to-keep-your-business-safe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/The-Telegraph.jpg</image:loc><image:caption>TheTelegraph</image:caption><image:title>TheTelegraph</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/converging-endpoint-and-mobile-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Healthcare%20CISOs%20Can%20Do%20Differently%20Ransomware-1.png</image:loc><image:caption>WhatHealthcareCISOsCanDoDifferentlyRansomware1</image:caption><image:title>WhatHealthcareCISOsCanDoDifferentlyRansomware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ed-circle.png</image:loc><image:caption>edcircle</image:caption><image:title>edcircle</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mobile-endpoints-hero-1-1.png</image:loc><image:caption>mobileendpointshero11</image:caption><image:title>mobileendpointshero11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IBM.png</image:loc><image:caption>IBM</image:caption><image:title>IBM</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/health-system-ransomware-attack-highlights-patients-vulnerability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Axios%20logo-1.png</image:loc><image:caption>Axioslogo1</image:caption><image:title>Axioslogo1</image:title></image:image><lastmod>2022-10-22</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-jack-rhysider-and-the-darknet-diaries</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7)-1.png</image:loc><image:caption>MaliciousLifeepisode71</image:caption><image:title>MaliciousLifeepisode71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/128%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>128MALICIOUSLIFE</image:caption><image:title>128MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed%20(2).png</image:loc><image:caption>unnamed2</image:caption><image:title>unnamed2</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/prometei-botnet-adds-new-twist-to-exchange-server-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-Apr-23-2021-01-51-51-01-AM.png</image:loc><image:caption>DarkReadinglogoApr23202101515101AM</image:caption><image:title>DarkReadinglogoApr23202101515101AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/deepfakes-novelty-trend-or-novel-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/yossi-hs.png</image:loc><image:caption>yossihs</image:caption><image:title>yossihs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Deepfakes-Blog.jpg</image:loc><image:caption>DeepfakesBlog</image:caption><image:title>DeepfakesBlog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(115).png</image:loc><image:caption>blogposttext115</image:caption><image:title>blogposttext115</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>BLOGSOCIALSETNews11</image:caption><image:title>BLOGSOCIALSETNews11</image:title></image:image><lastmod>2022-05-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-emerges-from-stealth-to-prevent-damage-after-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/vb.jpg</image:loc><image:caption>vb</image:caption><image:title>vb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/boston-techs-35-people-to-watch-in-2017</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/BuiltinBoston.png</image:loc><image:caption>BuiltinBoston</image:caption><image:title>BuiltinBoston</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-to-the-herd-100-featuring-top-emerging-privately-held-u.s.-technology-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-04</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-may-12th-2022-live-attack-simulation-ransomware-threat-hunter-series</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Headshot%20image%20template%20(6).png</image:loc><image:caption>CopyofHeadshotimagetemplate6</image:caption><image:title>CopyofHeadshotimagetemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jj-hex-hs2.png</image:loc><image:caption>jjhexhs2</image:caption><image:title>jjhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(67).png</image:loc><image:caption>blogposttext67</image:caption><image:title>blogposttext67</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(102).png</image:loc><image:caption>blogposttext102</image:caption><image:title>blogposttext102</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94).png</image:loc><image:caption>blogposttext94</image:caption><image:title>blogposttext94</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-05-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/your-new-cso-might-be-a-learning-computer-that-loves-cats-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/PC-Magazine.png</image:loc><image:caption>PCMagazine</image:caption><image:title>PCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware/the-state-of-ransomware-in-the-retail-sector</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(85).png</image:loc><image:caption>blogposttext85</image:caption><image:title>blogposttext85</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-02T070344.027.png</image:loc><image:caption>blogposttext20220802T070344027</image:caption><image:title>blogposttext20220802T070344027</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(61).png</image:loc><image:caption>blogposttext61</image:caption><image:title>blogposttext61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-04-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/massive-cyberattack-spreads-ransomware-across-europe-us</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/ABC-News.png</image:loc><image:caption>ABCNews</image:caption><image:title>ABCNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-vs.-carbon-black-why-delayed-detections-matter</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-2.jpg</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/keeping%20up%20with%20ai%20innovation%20blog%20img.png</image:loc><image:caption>keepingupwithaiinnovationblogimg</image:caption><image:title>keepingupwithaiinnovationblogimg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(7).png</image:loc><image:caption>Vs7</image:caption><image:title>Vs7</image:title></image:image><lastmod>2022-03-22</lastmod></url><url><loc>https://www.cybereason.com/blog/apts-the-board-and-you-the-struggle-continues</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/kim-blog-post-1024x391.jpg</image:loc><image:caption>kimblogpost1024x391</image:caption><image:title>kimblogpost1024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Jordan%20Bowen.png</image:loc><image:caption>JordanBowen</image:caption><image:title>JordanBowen</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/blog/why-add-endpoint-detection-and-response-edr-to-your-security-portfolio</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pedro-lopes-264652-1.jpg</image:loc><image:caption>pedrolopes2646521</image:caption><image:title>pedrolopes2646521</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-takes-center-stage-speaking-at-rsa-conference-2021</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-05-19</lastmod></url><url><loc>https://www.cybereason.com/blog/securing-the-financial-sector-now-and-into-the-future-with-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T141451.987.png</image:loc><image:caption>blogposttext20220725T141451987</image:caption><image:title>blogposttext20220725T141451987</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG-2.png</image:loc><image:caption>BLOG2</image:caption><image:title>BLOG2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/blog/what-can-chess-grandmasters-teach-us-about-cyber</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Can%20Chess%20Grandmasters%20Teach%20Us.png</image:loc><image:caption>WhatCanChessGrandmastersTeachUs</image:caption><image:title>WhatCanChessGrandmastersTeachUs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-and-intel-partner-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Week%201.jpg</image:loc><image:caption>SecurityWeek1</image:caption><image:title>SecurityWeek1</image:title></image:image><lastmod>2021-02-04</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-black-hat-live-preventing-unknown-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/ransomware-blog-full-width-imge-1000x391.jpg</image:loc><image:caption>ransomwareblogfullwidthimge1000x391</image:caption><image:title>ransomwareblogfullwidthimge1000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(20).png</image:loc><image:caption>MaliciousLifeepisode20</image:caption><image:title>MaliciousLifeepisode20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/russian-fake-news-explained-mlbside-ep-209.png</image:loc><image:caption>russianfakenewsexplainedmlbsideep209</image:caption><image:title>russianfakenewsexplainedmlbsideep209</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-what-comes-next-for-ngav</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV-redefined-blog-post-text.png</image:loc><image:caption>NGAVredefinedblogposttext</image:caption><image:title>NGAVredefinedblogposttext</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/EDR-NGAV-header.jpg</image:loc><image:caption>EDRNGAVheader</image:caption><image:title>EDRNGAVheader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-11T064615.861.png</image:loc><image:caption>blogposttext20221011T064615861</image:caption><image:title>blogposttext20221011T064615861</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sam-curry-interview-would-you-rather-pull-a-tooth-or-save-a-nation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Fed%20News%20Radio.jpg</image:loc><image:caption>FedNewsRadio</image:caption><image:title>FedNewsRadio</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/lazy-hackers-turn-to-automated-attack-tools</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BBC_News.svg.png</image:loc><image:caption>BBCNewssvg</image:caption><image:title>BBCNewssvg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cybereason-ciso-interview-series-why-including-information-security-from-a-projects-start-keeps-everyone-happy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/GuyDaubenspeck_CISO_Kasasa.jpg</image:loc><image:caption>GuyDaubenspeckCISOKasasa</image:caption><image:title>GuyDaubenspeckCISOKasasa</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-54.jpg</image:loc><image:caption>Untitleddesign54</image:caption><image:title>Untitleddesign54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-03-26</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/tom-fakterman</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/tom-fakterman.jpg</image:loc><image:caption>tomfakterman</image:caption><image:title>tomfakterman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template%20(1).png</image:loc><image:caption>CybereasonVsTemplate1</image:caption><image:title>CybereasonVsTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/malicious-life-podcast</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode.png</image:loc><image:caption>MaliciousLifeepisode</image:caption><image:title>MaliciousLifeepisode</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jailbreaking%20Tractors.png</image:loc><image:caption>JailbreakingTractors</image:caption><image:title>JailbreakingTractors</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(23).png</image:loc><image:caption>MaliciousLifeepisode23</image:caption><image:title>MaliciousLifeepisode23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(20).png</image:loc><image:caption>MaliciousLifeepisode20</image:caption><image:title>MaliciousLifeepisode20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-246-Card.png</image:loc><image:caption>MLEp246Card</image:caption><image:title>MLEp246Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/nfts-disappear-mlbside-ep-207.png</image:loc><image:caption>nftsdisappearmlbsideep207</image:caption><image:title>nftsdisappearmlbsideep207</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-239-Card.png</image:loc><image:caption>MLEp239Card</image:caption><image:title>MLEp239Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20to%20Not%20Build%20a%20Cybersecurity%20Startup.png</image:loc><image:caption>HowtoNotBuildaCybersecurityStartup</image:caption><image:title>HowtoNotBuildaCybersecurityStartup</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ML-Ep-249-featured.png</image:loc><image:caption>MLEp249featured</image:caption><image:title>MLEp249featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(18).png</image:loc><image:caption>MaliciousLifeepisode18</image:caption><image:title>MaliciousLifeepisode18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-245-Card.png</image:loc><image:caption>MLEp245Card</image:caption><image:title>MLEp245Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-234-card.png</image:loc><image:caption>mlep234card</image:caption><image:title>mlep234card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-251-featured.png</image:loc><image:caption>MLEp251featured</image:caption><image:title>MLEp251featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Logo%20(1).jpg</image:loc><image:caption>MaliciousLifeLogo1</image:caption><image:title>MaliciousLifeLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(29).png</image:loc><image:caption>MaliciousLifeepisode29</image:caption><image:title>MaliciousLifeepisode29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Podcast%20LabMD%20vs%20FTC.png</image:loc><image:caption>MaliciousLifePodcastLabMDvsFTC</image:caption><image:title>MaliciousLifePodcastLabMDvsFTC</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(13).png</image:loc><image:caption>MaliciousLifeepisode13</image:caption><image:title>MaliciousLifeepisode13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-237-card.png</image:loc><image:caption>mlep237card</image:caption><image:title>mlep237card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/other-problem-with-nfts-ep-206.png</image:loc><image:caption>otherproblemwithnftsep206</image:caption><image:title>otherproblemwithnftsep206</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-229-Card.png</image:loc><image:caption>MLEp229Card</image:caption><image:title>MLEp229Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-236-card.png</image:loc><image:caption>mlep236card</image:caption><image:title>mlep236card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(26).png</image:loc><image:caption>MaliciousLifeepisode26</image:caption><image:title>MaliciousLifeepisode26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/russian-fake-news-explained-mlbside-ep-209.png</image:loc><image:caption>russianfakenewsexplainedmlbsideep209</image:caption><image:title>russianfakenewsexplainedmlbsideep209</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(2)-1.png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/sony-bmg-rootkit-ep-218.png</image:loc><image:caption>sonybmgrootkitep218</image:caption><image:title>sonybmgrootkitep218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/how-countries-can-lose-the-internet-ep-213.png</image:loc><image:caption>howcountriescanlosetheinternetep213</image:caption><image:title>howcountriescanlosetheinternetep213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/bug-bounty-programs-ep-221.png</image:loc><image:caption>bugbountyprogramsep221</image:caption><image:title>bugbountyprogramsep221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt1-ep-210.png</image:loc><image:caption>lawrenceberkelehackpt1ep210</image:caption><image:title>lawrenceberkelehackpt1ep210</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(9).png</image:loc><image:caption>MaliciousLifeepisode9</image:caption><image:title>MaliciousLifeepisode9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-247-Card.png</image:loc><image:caption>MLEp247Card</image:caption><image:title>MLEp247Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ad-fraud-pt1-ep-217.png</image:loc><image:caption>adfraudpt1ep217</image:caption><image:title>adfraudpt1ep217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(8).png</image:loc><image:caption>MaliciousLifeepisode8</image:caption><image:title>MaliciousLifeepisode8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(24).png</image:loc><image:caption>MaliciousLifeepisode24</image:caption><image:title>MaliciousLifeepisode24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-224-Card.png</image:loc><image:caption>MLEp224Card</image:caption><image:title>MLEp224Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(2).png</image:loc><image:caption>Maliciouslifepodcast2</image:caption><image:title>Maliciouslifepodcast2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/operation-ivy-bells-ep-208.png</image:loc><image:caption>operationivybellsep208</image:caption><image:title>operationivybellsep208</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Would%20Happen%20if%20CBS%20Got%20Hacked.png</image:loc><image:caption>WhatWouldHappenifCBSGotHacked</image:caption><image:title>WhatWouldHappenifCBSGotHacked</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ad-fraud-pt2-ep-217.png</image:loc><image:caption>adfraudpt2ep217</image:caption><image:title>adfraudpt2ep217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/generative-ai-dangerous-ep-222.png</image:loc><image:caption>generativeaidangerousep222</image:caption><image:title>generativeaidangerousep222</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(14).png</image:loc><image:caption>MaliciousLifeepisode14</image:caption><image:title>MaliciousLifeepisode14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-226-Card.png</image:loc><image:caption>MLEp226Card</image:caption><image:title>MLEp226Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-248-Card.png</image:loc><image:caption>MLEp248Card</image:caption><image:title>MLEp248Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Russian%20Business%20Network.png</image:loc><image:caption>TheRussianBusinessNetwork</image:caption><image:title>TheRussianBusinessNetwork</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(3).png</image:loc><image:caption>Maliciouslifepodcast3</image:caption><image:title>Maliciouslifepodcast3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Can%20Chess%20Grandmasters%20Teach%20Us.png</image:loc><image:caption>WhatCanChessGrandmastersTeachUs</image:caption><image:title>WhatCanChessGrandmastersTeachUs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(3)-1.png</image:loc><image:caption>MaliciousLifeepisode31</image:caption><image:title>MaliciousLifeepisode31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(12).png</image:loc><image:caption>MaliciousLifeepisode12</image:caption><image:title>MaliciousLifeepisode12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-232-Card.png</image:loc><image:caption>MLEp232Card</image:caption><image:title>MLEp232Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/the%20problem%20with%20kernel%20mode%20anti%20cheat%20software.png</image:loc><image:caption>theproblemwithkernelmodeanticheatsoftware</image:caption><image:title>theproblemwithkernelmodeanticheatsoftware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/economics-of-cybersecurity-ep-215.png</image:loc><image:caption>economicsofcybersecurityep215</image:caption><image:title>economicsofcybersecurityep215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(10).png</image:loc><image:caption>MaliciousLifeepisode10</image:caption><image:title>MaliciousLifeepisode10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-1.png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(21).png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-233-Card.png</image:loc><image:caption>MLEp233Card</image:caption><image:title>MLEp233Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T082054.921.png</image:loc><image:caption>blogposttext20221003T082054921</image:caption><image:title>blogposttext20221003T082054921</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-244-Card.png</image:loc><image:caption>MLEp244Card</image:caption><image:title>MLEp244Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(7).png</image:loc><image:caption>Maliciouslifepodcast7</image:caption><image:title>Maliciouslifepodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-252-featured.png</image:loc><image:caption>MLEp252featured</image:caption><image:title>MLEp252featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(2).png</image:loc><image:caption>MaliciousLifeepisode2</image:caption><image:title>MaliciousLifeepisode2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(4).png</image:loc><image:caption>Maliciouslifepodcast4</image:caption><image:title>Maliciouslifepodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(3)-2.png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-thamar-reservoir.png</image:loc><image:caption>MaliciousLifeepisodethamarreservoir</image:caption><image:title>MaliciousLifeepisodethamarreservoir</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-223-Card.png</image:loc><image:caption>MLEp223Card</image:caption><image:title>MLEp223Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5)-1.png</image:loc><image:caption>MaliciousLifeepisode51</image:caption><image:title>MaliciousLifeepisode51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5).png</image:loc><image:caption>MaliciousLifeepisode5</image:caption><image:title>MaliciousLifeepisode5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(5).png</image:loc><image:caption>Maliciouslifepodcast5</image:caption><image:title>Maliciouslifepodcast5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(15).png</image:loc><image:caption>MaliciousLifeepisode15</image:caption><image:title>MaliciousLifeepisode15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-241-Card.png</image:loc><image:caption>MLEp241Card</image:caption><image:title>MLEp241Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4)-1.png</image:loc><image:caption>MaliciousLifeepisode41</image:caption><image:title>MaliciousLifeepisode41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-225-Card.png</image:loc><image:caption>MLEp225Card</image:caption><image:title>MLEp225Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(25).png</image:loc><image:caption>MaliciousLifeepisode25</image:caption><image:title>MaliciousLifeepisode25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7)-1.png</image:loc><image:caption>MaliciousLifeepisode71</image:caption><image:title>MaliciousLifeepisode71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7).png</image:loc><image:caption>MaliciousLifeepisode7</image:caption><image:title>MaliciousLifeepisode7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(17).png</image:loc><image:caption>MaliciousLifeepisode17</image:caption><image:title>MaliciousLifeepisode17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4).png</image:loc><image:caption>MaliciousLifeepisode4</image:caption><image:title>MaliciousLifeepisode4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(32).png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(1).png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/reason-you-dont-have-data-privacy-ep-214.png</image:loc><image:caption>reasonyoudonthavedataprivacyep214</image:caption><image:title>reasonyoudonthavedataprivacyep214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-242-Card.png</image:loc><image:caption>MLEp242Card</image:caption><image:title>MLEp242Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(1)-1.png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(30).png</image:loc><image:caption>MaliciousLifeepisode30</image:caption><image:title>MaliciousLifeepisode30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(31).png</image:loc><image:caption>MaliciousLifeepisode31</image:caption><image:title>MaliciousLifeepisode31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(28).png</image:loc><image:caption>MaliciousLifeepisode28</image:caption><image:title>MaliciousLifeepisode28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(6).png</image:loc><image:caption>Maliciouslifepodcast6</image:caption><image:title>Maliciouslifepodcast6</image:title></image:image><lastmod>2022-03-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-state-department-reportedly-sustained-cyber-incident</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Aug-27-2021-12-16-13-82-AM.png</image:loc><image:caption>BankinfosecuritylogoAug27202112161382AM</image:caption><image:title>BankinfosecuritylogoAug27202112161382AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-08-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-right-roles-for-siem-and-edr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity-6.jpg</image:loc><image:caption>Bankinfosecurity6</image:caption><image:title>Bankinfosecurity6</image:title></image:image><lastmod>2020-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-managing-the-security-product-salesperson</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(12).png</image:loc><image:caption>CISOStoriestemplate12</image:caption><image:title>CISOStoriestemplate12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(10)-1.png</image:loc><image:caption>pastedimage0101</image:caption><image:title>pastedimage0101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-zeroaccess-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(33).png</image:loc><image:caption>blogposttext33</image:caption><image:title>blogposttext33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/goot-loader-blog-featured.png</image:loc><image:caption>gootloaderblogfeatured</image:caption><image:title>gootloaderblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-7.png</image:loc><image:caption>image87</image:caption><image:title>image87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2018-07-09</lastmod></url><url><loc>https://www.cybereason.com/blog/yonatan-striem-amit-talks-to-eweek-about-how-cybereason-blocks-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_381826999-1000x391.jpg</image:loc><image:caption>shutterstock3818269991000x391</image:caption><image:title>shutterstock3818269991000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog_automatingR.png</image:loc><image:caption>blogautomatingR</image:caption><image:title>blogautomatingR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/three-reasons-why-endpoints-cannot-remain-a-security-blind-spot</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T125306.964.png</image:loc><image:caption>blogposttext20221003T125306964</image:caption><image:title>blogposttext20221003T125306964</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blind%20Spot.jpg</image:loc><image:caption>BlindSpot</image:caption><image:title>BlindSpot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20Ransomware%20is%20Driving%20SOC%20Modernization%20Requirements.png</image:loc><image:caption>HowRansomwareisDrivingSOCModernizationRequirements</image:caption><image:title>HowRansomwareisDrivingSOCModernizationRequirements</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/achieving-high-fidelity-detections-with-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(72).png</image:loc><image:caption>blogposttext72</image:caption><image:title>blogposttext72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-13T051646.778.png</image:loc><image:caption>blogposttext20220713T051646778</image:caption><image:title>blogposttext20220713T051646778</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-18T125623.731.png</image:loc><image:caption>blogposttext20220718T125623731</image:caption><image:title>blogposttext20220718T125623731</image:title></image:image><lastmod>2022-07-19</lastmod></url><url><loc>https://www.cybereason.com/services/security-101-assessment</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/OPTIMIZE_SECURITY_OPS_CR_ICONS-20.svg</image:loc><image:caption>OPTIMIZESECURITYOPSCRICONS20</image:caption><image:title>OPTIMIZESECURITYOPSCRICONS20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/IR_Service_v1_thumbnail-min.png</image:loc><image:caption>IRServicev1thumbnailmin</image:caption><image:title>IRServicev1thumbnailmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PROACTIVE_THREATHUNTING_CR_ICONS-25.svg</image:loc><image:caption>PROACTIVETHREATHUNTINGCRICONS25</image:caption><image:title>PROACTIVETHREATHUNTINGCRICONS25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/TECH_DEEPDIVE_KNOWLEDGE_CR_ICONS-27.svg</image:loc><image:caption>TECHDEEPDIVEKNOWLEDGECRICONS27</image:caption><image:title>TECHDEEPDIVEKNOWLEDGECRICONS27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/iconsand.png</image:loc><image:caption>iconsand</image:caption><image:title>iconsand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-icon--black.svg</image:loc><image:caption>crlogoiconblack</image:caption><image:title>crlogoiconblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/IR_ProfService_Brief_v1_Thumbnail.png</image:loc><image:caption>IRProfServiceBriefv1Thumbnail</image:caption><image:title>IRProfServiceBriefv1Thumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--xdr-gradient.jpg</image:loc><image:caption>crbgheroxdrgradient</image:caption><image:title>crbgheroxdrgradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/MAGNIFY_CR_ICONS-45.svg</image:loc><image:caption>MAGNIFYCRICONS45</image:caption><image:title>MAGNIFYCRICONS45</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/intro-to-the-dragonfly-hacking-group</loc><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_732758329.jpg</image:loc><image:caption>shutterstock732758329</image:caption><image:title>shutterstock732758329</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-06T130708.511.png</image:loc><image:caption>blogposttext20220706T130708511</image:caption><image:title>blogposttext20220706T130708511</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(12).png</image:loc><image:caption>MaliciousLifeepisode12</image:caption><image:title>MaliciousLifeepisode12</image:title></image:image><lastmod>2018-07-09</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-names-cybersecurity-pioneer-zohar-alon-president-of-product-and-rd</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-09-21</lastmod></url><url><loc>https://www.cybereason.com/blog/inside-effective-edr-evaluation-testing</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDRTesting-blog.png</image:loc><image:caption>EDRTestingblog</image:caption><image:title>EDRTestingblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dani-wood.png</image:loc><image:caption>daniwood</image:caption><image:title>daniwood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-05-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-acquires-empow-also-inks-deal-with-cyderes</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-3.png</image:loc><image:caption>MSSPAlertlogo3</image:caption><image:title>MSSPAlertlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-07-27</lastmod></url><url><loc>https://www.cybereason.com/blog/live-webinar-featuring-forrester-considering-nextgen-endpoint-security-get-it-right</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/LIVE-WEBINAR-1-1024x391.png</image:loc><image:caption>LIVEWEBINAR11024x391</image:caption><image:title>LIVEWEBINAR11024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/xdr-the-key-to-solving-siem-shortcomings</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(76).png</image:loc><image:caption>blogposttext76</image:caption><image:title>blogposttext76</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(43).png</image:loc><image:caption>CybereasonBlogTemplate43</image:caption><image:title>CybereasonBlogTemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-2.png</image:loc><image:caption>CybereasonBlogTemplate52</image:caption><image:title>CybereasonBlogTemplate52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/blog/zero-trust-race-is-on-do-you-have-the-right-engine</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(92).png</image:loc><image:caption>blogposttext92</image:caption><image:title>blogposttext92</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(16).png</image:loc><image:caption>CybereasonBlogTemplate16</image:caption><image:title>CybereasonBlogTemplate16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(38)-1.png</image:loc><image:caption>CybereasonBlogTemplate381</image:caption><image:title>CybereasonBlogTemplate381</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-inside-the-redeemer-2.0-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Aug-18-2022-06-04-38-33-PM.png</image:loc><image:caption>image5Aug18202206043833PM</image:caption><image:title>image5Aug18202206043833PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Aug-18-2022-06-01-00-24-PM.png</image:loc><image:caption>image4Aug18202206010024PM</image:caption><image:title>image4Aug18202206010024PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Aug-18-2022-06-02-08-38-PM.png</image:loc><image:caption>image3Aug18202206020838PM</image:caption><image:title>image3Aug18202206020838PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(124).png</image:loc><image:caption>blogposttext124</image:caption><image:title>blogposttext124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Aug-18-2022-06-06-03-74-PM.png</image:loc><image:caption>image6Aug18202206060374PM</image:caption><image:title>image6Aug18202206060374PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Aug-18-2022-06-06-26-76-PM.png</image:loc><image:caption>image2Aug18202206062676PM</image:caption><image:title>image2Aug18202206062676PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Aug-18-2022-05-38-00-81-PM.png</image:loc><image:caption>image8Aug18202205380081PM</image:caption><image:title>image8Aug18202205380081PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Aug-18-2022-06-03-38-42-PM.png</image:loc><image:caption>image7Aug18202206033842PM</image:caption><image:title>image7Aug18202206033842PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Aug-18-2022-06-02-48-81-PM.png</image:loc><image:caption>image1Aug18202206024881PM</image:caption><image:title>image1Aug18202206024881PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T093119.758.png</image:loc><image:caption>blogposttext20220830T093119758</image:caption><image:title>blogposttext20220830T093119758</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(20)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews201</image:caption><image:title>CopyofBLOGSOCIALSETNews201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Aug-18-2022-06-05-34-53-PM.png</image:loc><image:caption>image9Aug18202206053453PM</image:caption><image:title>image9Aug18202206053453PM</image:title></image:image><lastmod>2022-08-22</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-wank-worm-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Noa%20Pinkas.jpg</image:loc><image:caption>NoaPinkas</image:caption><image:title>NoaPinkas</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/47%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>47MALICIOUSLIFE</image:caption><image:title>47MALICIOUSLIFE</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-names-ghazal-asif-its-senior-vice-president-of-worldwide-channels</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-02-28</lastmod></url><url><loc>https://www.cybereason.com/fundamentals/what-is-mdr</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/101-what-is-mdr-featured.png</image:loc><image:caption>101whatismdrfeatured</image:caption><image:title>101whatismdrfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/dark-metal-background.png</image:loc><image:caption>darkmetalbackground</image:caption><image:title>darkmetalbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/three-realizations-in-light-of-the-great-bank-hacking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(9).png</image:loc><image:caption>MaliciousLifeepisode9</image:caption><image:title>MaliciousLifeepisode9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/blog/leveraging-excel-dde-for-lateral-movement-via-dcom</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dcom.png</image:loc><image:caption>dcom</image:caption><image:title>dcom</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/msndoc.png</image:loc><image:caption>msndoc</image:caption><image:title>msndoc</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/goot-loader-blog-featured.png</image:loc><image:caption>gootloaderblogfeatured</image:caption><image:title>gootloaderblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/replace.png</image:loc><image:caption>replace</image:caption><image:title>replace</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/calc.png</image:loc><image:caption>calc</image:caption><image:title>calc</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Picture1.png</image:loc><image:caption>Picture1</image:caption><image:title>Picture1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat-Alert-GootLoader-SEO-Poisoning.png</image:loc><image:caption>ThreatAlertGootLoaderSEOPoisoning</image:caption><image:title>ThreatAlertGootLoaderSEOPoisoning</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/with.png</image:loc><image:caption>with</image:caption><image:title>with</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/phil.jpg</image:loc><image:caption>phil</image:caption><image:title>phil</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/runmethod.png</image:loc><image:caption>runmethod</image:caption><image:title>runmethod</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2019-06-27</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-by-the-numbers-an-impact-overview</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-14T093955.662.png</image:loc><image:caption>blogposttext20220614T093955662</image:caption><image:title>blogposttext20220614T093955662</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(110).png</image:loc><image:caption>blogposttext110</image:caption><image:title>blogposttext110</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-2.png</image:loc><image:caption>CybereasonBlogTemplate32</image:caption><image:title>CybereasonBlogTemplate32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-12-22</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-hacking-language-models</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Eric_Wallace.jpeg</image:loc><image:caption>EricWallace</image:caption><image:title>EricWallace</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/generative-ai-dangerous-ep-222.png</image:loc><image:caption>generativeaidangerousep222</image:caption><image:title>generativeaidangerousep222</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(26).png</image:loc><image:caption>MaliciousLifeepisode26</image:caption><image:title>MaliciousLifeepisode26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/139%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>139MALICIOUSLIFE</image:caption><image:title>139MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2022-09-06</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-excels-in-2020-mitre-engenuity-attck-evaluations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eric-sun-hs.jpg</image:loc><image:caption>ericsunhs</image:caption><image:title>ericsunhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/MITRE-R3-blog-image.png</image:loc><image:caption>MITRER3blogimage</image:caption><image:title>MITRER3blogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/mitre-r3-blog-image-2.png</image:loc><image:caption>mitrer3blogimage2</image:caption><image:title>mitrer3blogimage2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/landing-pages/mitre-attack-framework-table.png</image:loc><image:caption>mitreattackframeworktable</image:caption><image:title>mitreattackframeworktable</image:title></image:image><lastmod>2022-01-05</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-selected-as-sc-magazine-2016-excellence-award-finalist</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-11.jpg</image:loc><image:caption>Untitleddesign11</image:caption><image:title>Untitleddesign11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast.png</image:loc><image:caption>CISOStoriespodcast</image:caption><image:title>CISOStoriespodcast</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(5).png</image:loc><image:caption>CISOStoriespodcast5</image:caption><image:title>CISOStoriespodcast5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/black-basta-new-ransomware-threat-aiming-for-the-big-league</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-Aug-17-2022-04-53-41-54-PM.png</image:loc><image:caption>CSOMagazinelogoAug17202204534154PM</image:caption><image:title>CSOMagazinelogoAug17202204534154PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2022-08-17</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-stops-customers-from-bad-rabbit-ransomware-infection-amit-serper-discovers-new-vaccine-for-bad-rabbit</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-five-mistakes-impacting-security-and-privacy-policy-creation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Charles%20Wood.png</image:loc><image:caption>CharlesWood</image:caption><image:title>CharlesWood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-2.png</image:loc><image:caption>CISOStoriestemplate42</image:caption><image:title>CISOStoriestemplate42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast.png</image:loc><image:caption>Maliciouslifepodcast</image:caption><image:title>Maliciouslifepodcast</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-10-28</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-ranked-with-google-costco-and-t-mobile-as-a-top-business-to-work-for</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-12-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sam-curry-joins-tom-field-from-ismg-media-to-discuss-the-newest-cybereason-holiday-ransomware-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Nov-23-2022-03-45-54-1075-PM.png</image:loc><image:caption>BankinfosecuritylogoNov2320220345541075PM</image:caption><image:title>BankinfosecuritylogoNov2320220345541075PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/fake-installer-valleyrat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image1.png</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image12.png</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image14.png</image:loc><image:caption>image14</image:caption><image:title>image14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image17.png</image:loc><image:caption>image17</image:caption><image:title>image17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image13.png</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image15.png</image:loc><image:caption>image15</image:caption><image:title>image15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image5.png</image:loc><image:caption>image5</image:caption><image:title>image5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(37).png</image:loc><image:caption>BLOGImagesTemplatev237</image:caption><image:title>BLOGImagesTemplatev237</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image4.png</image:loc><image:caption>image4</image:caption><image:title>image4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(84).png</image:loc><image:caption>blogposttext84</image:caption><image:title>blogposttext84</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image9.jpg</image:loc><image:caption>image9</image:caption><image:title>image9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image21.png</image:loc><image:caption>image21</image:caption><image:title>image21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image24.png</image:loc><image:caption>image24</image:caption><image:title>image24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image16.png</image:loc><image:caption>image16</image:caption><image:title>image16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image23.png</image:loc><image:caption>image23</image:caption><image:title>image23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image19.png</image:loc><image:caption>image19</image:caption><image:title>image19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image11.png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image18.png</image:loc><image:caption>image18</image:caption><image:title>image18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image10.png</image:loc><image:caption>image10</image:caption><image:title>image10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image26.png</image:loc><image:caption>image26</image:caption><image:title>image26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image6.png</image:loc><image:caption>image6</image:caption><image:title>image6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image7.png</image:loc><image:caption>image7</image:caption><image:title>image7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ValleyRat/image3.png</image:loc><image:caption>image3</image:caption><image:title>image3</image:title></image:image><lastmod>2026-02-03</lastmod></url><url><loc>https://www.cybereason.com/blog/cuckoo-spear-analyzing-noopdoor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-6.png</image:loc><image:caption>noopdoorblog6</image:caption><image:title>noopdoorblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-1.png</image:loc><image:caption>noopdoorblog1</image:caption><image:title>noopdoorblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-16.png</image:loc><image:caption>noopdoorblog16</image:caption><image:title>noopdoorblog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-yellow-bg--top-badge.png</image:loc><image:caption>crlogoyellowbgtopbadge</image:caption><image:title>crlogoyellowbgtopbadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Kotaro-Ogino.jpg</image:loc><image:caption>KotaroOgino</image:caption><image:title>KotaroOgino</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-5.png</image:loc><image:caption>noopdoorblog5</image:caption><image:title>noopdoorblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-17.png</image:loc><image:caption>noopdoorblog17</image:caption><image:title>noopdoorblog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-loic.jpg</image:loc><image:caption>DLLSideLoadingloic</image:caption><image:title>DLLSideLoadingloic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-3.png</image:loc><image:caption>noopdoorblog3</image:caption><image:title>noopdoorblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-15.png</image:loc><image:caption>noopdoorblog15</image:caption><image:title>noopdoorblog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-pt-2-featured.png</image:loc><image:caption>cuckoospearpt2featured</image:caption><image:title>cuckoospearpt2featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-2.png</image:loc><image:caption>noopdoorblog2</image:caption><image:title>noopdoorblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-12c.png</image:loc><image:caption>noopdoorblog12c</image:caption><image:title>noopdoorblog12c</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-10.png</image:loc><image:caption>noopdoorblog10</image:caption><image:title>noopdoorblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1).png</image:loc><image:caption>BLOGPOST1</image:caption><image:title>BLOGPOST1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-4.png</image:loc><image:caption>noopdoorblog4</image:caption><image:title>noopdoorblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-8.png</image:loc><image:caption>noopdoorblog8</image:caption><image:title>noopdoorblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-part-1-analysis-blog-analysis-featured.png</image:loc><image:caption>cuckoospearpart1analysisbloganalysisfeatured</image:caption><image:title>cuckoospearpart1analysisbloganalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-7.png</image:loc><image:caption>noopdoorblog7</image:caption><image:title>noopdoorblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-13c.png</image:loc><image:caption>noopdoorblog13c</image:caption><image:title>noopdoorblog13c</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-14.png</image:loc><image:caption>noopdoorblog14</image:caption><image:title>noopdoorblog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-9.png</image:loc><image:caption>noopdoorblog9</image:caption><image:title>noopdoorblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2024-09-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/black-basta-ransomware-gang-poses-significant-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Jul-20-2022-02-52-32-99-AM.png</image:loc><image:caption>SCMagazinelogoJul20202202523299AM</image:caption><image:title>SCMagazinelogoJul20202202523299AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-ransomware-attacks-and-the-true-cost-to-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/frank-johnson-largeImage-10-a-3748.jpg</image:loc><image:caption>frankjohnsonlargeImage10a3748</image:caption><image:title>frankjohnsonlargeImage10a3748</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO_51.png</image:loc><image:caption>CISO51</image:caption><image:title>CISO51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BryanHurd-390x390.png</image:loc><image:caption>BryanHurd390x390</image:caption><image:title>BryanHurd390x390</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Todd%20F.jpg</image:loc><image:caption>ToddF</image:caption><image:title>ToddF</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(10).png</image:loc><image:caption>CISOStoriestemplate10</image:caption><image:title>CISOStoriestemplate10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories%20(1).png</image:loc><image:caption>CISOStories1</image:caption><image:title>CISOStories1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/kerissa-varma-hs.png</image:loc><image:caption>kerissavarmahs</image:caption><image:title>kerissavarmahs</image:title></image:image><lastmod>2021-07-30</lastmod></url><url><loc>https://www.cybereason.com/resources/threat-alert-emotet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/YELLOW_THREAT_ALERT_CR_ICONS-53.svg</image:loc><image:caption>YELLOWTHREATALERTCRICONS53</image:caption><image:title>YELLOWTHREATALERTCRICONS53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/macos-bug-lets-you-log-in-as-admin-with-no-password-required</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Ars%20Technica.png</image:loc><image:caption>ArsTechnica</image:caption><image:title>ArsTechnica</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-08</lastmod></url><url><loc>https://www.cybereason.com/consulting/dark-web-monitoring-services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/prevent-id-horizontal-sml.png</image:loc><image:caption>preventidhorizontalsml</image:caption><image:title>preventidhorizontalsml</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-gen-feat-img-web.png</image:loc><image:caption>cybereasongenfeatimgweb</image:caption><image:title>cybereasongenfeatimgweb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Mitre%20Blog%202026.png</image:loc><image:caption>CybereasonMitreBlog2026</image:caption><image:title>CybereasonMitreBlog2026</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/MAGNIFY_CR_ICONS-45.svg</image:loc><image:caption>MAGNIFYCRICONS45</image:caption><image:title>MAGNIFYCRICONS45</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-yellow-divider-line.png</image:loc><image:caption>cybereasonyellowdividerline</image:caption><image:title>cybereasonyellowdividerline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owls-all--posed-trans.png</image:loc><image:caption>crowlsallposedtrans</image:caption><image:title>crowlsallposedtrans</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/denman-headshot.png</image:loc><image:caption>denmanheadshot</image:caption><image:title>denmanheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/CR_ICONS_SET_3-02.svg</image:loc><image:caption>CRICONSSET302</image:caption><image:title>CRICONSSET302</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DurrantProfilePic2025.png</image:loc><image:caption>DurrantProfilePic2025</image:caption><image:title>DurrantProfilePic2025</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/Headshots/Chris%20White%20Headshot.png</image:loc><image:caption>ChrisWhiteHeadshot</image:caption><image:title>ChrisWhiteHeadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-hero-protector-min.png</image:loc><image:caption>crheroprotectormin</image:caption><image:title>crheroprotectormin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILITY_HUNTING_CR_ICONS-13.svg</image:loc><image:caption>VISIBILITYHUNTINGCRICONS13</image:caption><image:title>VISIBILITYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-spine-bg--posture-incident-management-d.jpg</image:loc><image:caption>crplatformspinebgpostureincidentmanagementd</image:caption><image:title>crplatformspinebgpostureincidentmanagementd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/responder-v2-horizontal.png</image:loc><image:caption>responderv2horizontal</image:caption><image:title>responderv2horizontal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(36).png</image:loc><image:caption>BLOGImagesTemplatev236</image:caption><image:title>BLOGImagesTemplatev236</image:title></image:image><lastmod>2025-05-02</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-cyber-terrorism</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/19%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>19MALICIOUSLIFE1</image:caption><image:title>19MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/intel-unveils-ransomware-fighting-cpus</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Feb-04-2021-02-33-47-37-PM.png</image:loc><image:caption>SCMagazinelogoFeb04202102334737PM</image:caption><image:title>SCMagazinelogoFeb04202102334737PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-02-04</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereasons-lodrina-cherne-joins-panel-on-building-a-more-inclusive-future-in-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(12).png</image:loc><image:caption>blogposttext12</image:caption><image:title>blogposttext12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(22).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews22</image:caption><image:title>CopyofBLOGSOCIALSETNews22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(35).png</image:loc><image:caption>blogposttext35</image:caption><image:title>blogposttext35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-09-09</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-april-26th-profile-of-the-dark-economy-of-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(23).png</image:loc><image:caption>CybereasonBlogTemplate23</image:caption><image:title>CybereasonBlogTemplate23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(77).png</image:loc><image:caption>blogposttext77</image:caption><image:title>blogposttext77</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/maggie-circle-headshot-1.png</image:loc><image:caption>maggiecircleheadshot1</image:caption><image:title>maggiecircleheadshot1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-circle-headshot.png</image:loc><image:caption>jjcircleheadshot</image:caption><image:title>jjcircleheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/bob-bigman-circle-headshot.png</image:loc><image:caption>bobbigmancircleheadshot</image:caption><image:title>bobbigmancircleheadshot</image:title></image:image><lastmod>2022-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/attack-behavior-offers-insights-not-the-tools-used</loc><image:image><image:loc>https://www.cybereason.com/hubfs/keeping%20up%20with%20ai%20innovation%20blog%20img.png</image:loc><image:caption>keepingupwithaiinnovationblogimg</image:caption><image:title>keepingupwithaiinnovationblogimg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(7).png</image:loc><image:caption>Vs7</image:caption><image:title>Vs7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/hacker-activity2-1024x391.jpg</image:loc><image:caption>hackeractivity21024x391</image:caption><image:title>hackeractivity21024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/lives-are-at-stake-hacking-of-us-hospitals-highlights-deadly-risk-of-ransomware-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20Finance%20logo-2.png</image:loc><image:caption>YahooFinancelogo2</image:caption><image:title>YahooFinancelogo2</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-what-happened-at-uber</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/JoeSullivan.jpg</image:loc><image:caption>JoeSullivan</image:caption><image:title>JoeSullivan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-239-Card.png</image:loc><image:caption>MLEp239Card</image:caption><image:title>MLEp239Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2024-06-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/interview-with-yonatan-striem-amit-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SD_Logo_BLACK.png</image:loc><image:caption>SDLogoBLACK</image:caption><image:title>SDLogoBLACK</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2019-07-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/update-your-iphone-now-apple-releases-urgent-fix-to-mend-dangerous-security-bugs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Sun%20logo-1.png</image:loc><image:caption>TheSunlogo1</image:caption><image:title>TheSunlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-02-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-announces-a/nz-partnership-with-nextgen-distribution-securitybrief-australia</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityBriefEU.png</image:loc><image:caption>SecurityBriefEU</image:caption><image:title>SecurityBriefEU</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-earns-gold-opswat-access-control-certification</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/beast-ransomware-blog-featured.png</image:loc><image:caption>beastransomwareblogfeatured</image:caption><image:title>beastransomwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(18).png</image:loc><image:caption>CybereasonBlogTemplate18</image:caption><image:title>CybereasonBlogTemplate18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-09-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/vaccine-not-killswitch-found-for-petya-notpetya-ransomware-outbreak</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Bleeping-Computer1.png</image:loc><image:caption>BleepingComputer1</image:caption><image:title>BleepingComputer1</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/when-not-if-does-ncsc-pessimism-hurt-uk-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Infosecurity-Magazine.png</image:loc><image:caption>InfosecurityMagazine</image:caption><image:title>InfosecurityMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/resources/business-services-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/bs-case-study-card-2.png</image:loc><image:caption>bscasestudycard2</image:caption><image:title>bscasestudycard2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-05-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-quick-and-the-breached-futureproofing-security-operations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-17.png</image:loc><image:caption>SCMagazine17</image:caption><image:title>SCMagazine17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-04-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fbi-warns-russia-is-probing-energy-sector-cyber-systems-as-threat-to-industrial-control-technology-grows</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Utility%20Dive%20logo.png</image:loc><image:caption>UtilityDivelogo</image:caption><image:title>UtilityDivelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-08-25</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-necessity-is-the-mother-of-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog.png</image:loc><image:caption>blog</image:caption><image:title>blog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/tatu.png</image:loc><image:caption>tatu</image:caption><image:title>tatu</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-andrew-borene-is-elected-to-the-national-defense-industrial-associations-special-operations-division-executive-board</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-09-16</lastmod></url><url><loc>https://www.cybereason.com/blog/research/medusalocker-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusalocker-10.png</image:loc><image:caption>medusalocker10</image:caption><image:title>medusalocker10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusalocker-8.png</image:loc><image:caption>medusalocker8</image:caption><image:title>medusalocker8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusalocker-1.png</image:loc><image:caption>medusalocker1</image:caption><image:title>medusalocker1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusalocker-5.png</image:loc><image:caption>medusalocker5</image:caption><image:title>medusalocker5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusalocker-6.png</image:loc><image:caption>medusalocker6</image:caption><image:title>medusalocker6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusalocker-9.png</image:loc><image:caption>medusalocker9</image:caption><image:title>medusalocker9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusalocker-3.png</image:loc><image:caption>medusalocker3</image:caption><image:title>medusalocker3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusalocker-11.png</image:loc><image:caption>medusalocker11</image:caption><image:title>medusalocker11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusalocker-7.png</image:loc><image:caption>medusalocker7</image:caption><image:title>medusalocker7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusalocker-2.png</image:loc><image:caption>medusalocker2</image:caption><image:title>medusalocker2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusalocker-4.png</image:loc><image:caption>medusalocker4</image:caption><image:title>medusalocker4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/medusa-blog.png</image:loc><image:caption>medusablog</image:caption><image:title>medusablog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-using-the-attack-lifecycle-to-the-defenders-advantage</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(105)-1.png</image:loc><image:caption>blogposttext1051</image:caption><image:title>blogposttext1051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_503549542.jpg</image:loc><image:caption>shutterstock503549542</image:caption><image:title>shutterstock503549542</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-15T085736.357.png</image:loc><image:caption>blogposttext20220915T085736357</image:caption><image:title>blogposttext20220915T085736357</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-passion-for-solving-problems-is-key-to-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template%20(2).png</image:loc><image:caption>CISOStoriesTemplate2</image:caption><image:title>CISOStoriesTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Todd%20F.jpg</image:loc><image:caption>ToddF</image:caption><image:title>ToddF</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WillLin.jpg</image:loc><image:caption>WillLin</image:caption><image:title>WillLin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-strengthens-xdr-offering-with-acquisition-of-empow-and-its-predictive-response-technology</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Buzz%20logo-2.jpg</image:loc><image:caption>ChannelBuzzlogo2</image:caption><image:title>ChannelBuzzlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-07-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-pandemic-threatens-supply-of-vaccine-after-uae-approves-chinese-jab</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mashable%20logo.png</image:loc><image:caption>Mashablelogo</image:caption><image:title>Mashablelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/trisis-nation-state-authored-malware-leaked-onto-internet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/rt-news-sam-curry-interview</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/RT-News.jpg</image:loc><image:caption>RTNews</image:caption><image:title>RTNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/what-clinton-trump-missed-when-debating-information-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(30).png</image:loc><image:caption>blogposttext30</image:caption><image:title>blogposttext30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_490628485.jpg</image:loc><image:caption>shutterstock490628485</image:caption><image:title>shutterstock490628485</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-target-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gI_67392_Amit%20Serper%20Photo%202016.png</image:loc><image:caption>gI67392AmitSerperPhoto2016</image:caption><image:title>gI67392AmitSerperPhoto2016</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/30%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>30MALICIOUSLIFE</image:caption><image:title>30MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/insight-laws-protect-my-physical-property-so-why-not-my-electronic-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bloomberg%20law.png</image:loc><image:caption>bloomberglaw</image:caption><image:title>bloomberglaw</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2019-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-career-merger-acquisition-pen-test-audit</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_684671557.jpg</image:loc><image:caption>shutterstock684671557</image:caption><image:title>shutterstock684671557</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(25)-1.png</image:loc><image:caption>CybereasonBlogTemplate251</image:caption><image:title>CybereasonBlogTemplate251</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(81).png</image:loc><image:caption>blogposttext81</image:caption><image:title>blogposttext81</image:title></image:image><lastmod>2018-07-16</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-always-be-a-student-always-be-learning</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%2024.png</image:loc><image:caption>CISOStories24</image:caption><image:title>CISOStories24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(6)-1.png</image:loc><image:caption>pastedimage061</image:caption><image:title>pastedimage061</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/-cybereason-aims-to-be-the-go-to-company-in-a-world-of-tailored-cyber-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/calcalist%20logo.jpg</image:loc><image:caption>calcalistlogo</image:caption><image:title>calcalistlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-04-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-researcher-this-world-eating-malware-is-simple-but-so-is-the-internet-of-things</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-isnt-always-about-gangs-making-money</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cyberscoop%20logo-Jan-29-2022-03-02-55-19-PM.png</image:loc><image:caption>CyberscooplogoJan29202203025519PM</image:caption><image:title>CyberscooplogoJan29202203025519PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-receives-strong-rating-in-nss-labs-endpoint-protection-test</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-announces-inaugural-report-from-the-cyber-defenders-council</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CXO%20DX%20logo-1.jpg</image:loc><image:caption>CXODXlogo1</image:caption><image:title>CXODXlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-06-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-raises-25m-because-corporate-security-is-broken</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/tech_crunch.jpg</image:loc><image:caption>techcrunch</image:caption><image:title>techcrunch</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/assessing-the-health-of-the-security-industry-in-the-face-of-the-pandemic</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AMEinfo%20logo.jpg</image:loc><image:caption>AMEinfologo</image:caption><image:title>AMEinfologo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/epp-magic-quadrant-2021</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malop%20details-1.png</image:loc><image:caption>Malopdetails1</image:caption><image:title>Malopdetails1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cybereason-report.png</image:loc><image:caption>cybereasonreport</image:caption><image:title>cybereasonreport</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gartner_mq_NO_CTA-1.jpg</image:loc><image:caption>gartnermqNOCTA1</image:caption><image:title>gartnermqNOCTA1</image:title></image:image><lastmod>2022-06-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-wipro-breach-why-managed-service-providers-are-at-risk</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN-Logo-2.png</image:loc><image:caption>CRNLogo2</image:caption><image:title>CRNLogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2019-04-26</lastmod></url><url><loc>https://www.cybereason.com/resources/vulnerability-management-data-sheet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vulnerability-management-cybereason.jpg</image:loc><image:caption>vulnerabilitymanagementcybereason</image:caption><image:title>vulnerabilitymanagementcybereason</image:title></image:image><lastmod>2025-09-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-new-pay-as-you-grow-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Buyer%20logo.jpg</image:loc><image:caption>SecurityBuyerlogo</image:caption><image:title>SecurityBuyerlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sam-curry-and-esteemed-panelists-discuss-the-cost-of-ransomware-to-the-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Jan-17-2022-11-28-22-52-PM.png</image:loc><image:caption>SCMagazinelogoJan17202211282252PM</image:caption><image:title>SCMagazinelogoJan17202211282252PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2022-01-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-offers-a-new-take-on-protecting-all-those-work-from-home-laptops-and-phones</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes%20logo-3.png</image:loc><image:caption>Forbeslogo3</image:caption><image:title>Forbeslogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-01-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-target-critical-infrastructure-facility-using-triton-framework</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Teiss%20Logo-2.jpg</image:loc><image:caption>TeissLogo2</image:caption><image:title>TeissLogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-04-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereasons-sam-curry-appears-on-cnbc-to-discuss-holiday-ransomware-risks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNBC%20logo-Dec-02-2021-01-58-24-24-AM.png</image:loc><image:caption>CNBClogoDec02202101582424AM</image:caption><image:title>CNBClogoDec02202101582424AM</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/services/mdr-complete-bundle</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/Cybereason%20Dashboard%20Aug%202020.png</image:loc><image:caption>CybereasonDashboardAug2020</image:caption><image:title>CybereasonDashboardAug2020</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/chart-icon-check.svg</image:loc><image:caption>charticoncheck</image:caption><image:title>charticoncheck</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-dkgray-05.png</image:loc><image:caption>crbgsubtledkgray05</image:caption><image:title>crbgsubtledkgray05</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-ltgray-03.png</image:loc><image:caption>crbgsubtleltgray03</image:caption><image:title>crbgsubtleltgray03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/cr-mdr-mobile-app-screens-min.png</image:loc><image:caption>crmdrmobileappscreensmin</image:caption><image:title>crmdrmobileappscreensmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/REDUCE_FALSE_POSITIVES_CR_ICONS-18.svg</image:loc><image:caption>REDUCEFALSEPOSITIVESCRICONS18</image:caption><image:title>REDUCEFALSEPOSITIVESCRICONS18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PROTECT_ENTERPRISE_CR_ICONS-08.svg</image:loc><image:caption>PROTECTENTERPRISECRICONS08</image:caption><image:title>PROTECTENTERPRISECRICONS08</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-mdr-packages-comparison-thumbnail.jpg</image:loc><image:caption>crmdrpackagescomparisonthumbnail</image:caption><image:title>crmdrpackagescomparisonthumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/WEB_CR_ICONS-35.svg</image:loc><image:caption>WEBCRICONS35</image:caption><image:title>WEBCRICONS35</image:title></image:image><lastmod>2023-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-mariposa-botnet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/luis-hs.jpg</image:loc><image:caption>luishs</image:caption><image:title>luishs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-233-Card.png</image:loc><image:caption>MLEp233Card</image:caption><image:title>MLEp233Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/resources/cybereason-mobile-threat-defense</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/CR-mobile-theat-defense-thumb-cover.jpg</image:loc><image:caption>CRmobiletheatdefensethumbcover</image:caption><image:title>CRmobiletheatdefensethumbcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2025-09-29</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-catching-a-cybercriminal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(24).png</image:loc><image:caption>MaliciousLifeepisode24</image:caption><image:title>MaliciousLifeepisode24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/abdelkader_Cornelius.jpeg</image:loc><image:caption>abdelkaderCornelius</image:caption><image:title>abdelkaderCornelius</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Russian%20Business%20Network.png</image:loc><image:caption>TheRussianBusinessNetwork</image:caption><image:title>TheRussianBusinessNetwork</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(10).png</image:loc><image:caption>MaliciousLifeepisode10</image:caption><image:title>MaliciousLifeepisode10</image:title></image:image><lastmod>2022-05-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/global-cyberattack-campaign-hit-mobile-carrier-networks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-3.jpg</image:loc><image:caption>DarkReadinglogo3</image:caption><image:title>DarkReadinglogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-06-26</lastmod></url><url><loc>https://www.cybereason.com/blog/employee-spotlight-developing-a-unified-security-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-3.png</image:loc><image:caption>CybereasonBlogTemplate53</image:caption><image:title>CybereasonBlogTemplate53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20Dani%20Koretsky.png</image:loc><image:caption>EmployeeSpotlightDaniKoretsky</image:caption><image:title>EmployeeSpotlightDaniKoretsky</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(21).png</image:loc><image:caption>CybereasonBlogTemplate21</image:caption><image:title>CybereasonBlogTemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-1.jpg</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/u.s.-health-agency-suffers-ddos-attack-amid-covid-19-outbreak</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Teiss-1.jpg</image:loc><image:caption>Teiss1</image:caption><image:title>Teiss1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/93-of-uae-businesses-concerned-about-a-ransomware-attack-this-upcoming-holiday-season</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20MEA%20logo-1.png</image:loc><image:caption>SecurityMEAlogo1</image:caption><image:title>SecurityMEAlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-11-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/few-firms-will-be-ready-for-new-european-breach-disclosure-rules-fines</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CSO.png</image:loc><image:caption>CSO</image:caption><image:title>CSO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sinclair-broadcast-hit-with-ransomware-attack-data-stolen-from-network</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Futures-3.png</image:loc><image:caption>ChannelFutures3</image:caption><image:title>ChannelFutures3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-10-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-to-linkedins-2017-top-50-companies-</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/top-cyber-leader-warns-of-ransomware-scourge-admits-government-needs-to-do-more</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Hearst%20Television%20log.png</image:loc><image:caption>HearstTelevisionlog</image:caption><image:title>HearstTelevisionlog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_114406000-1024x391.jpg</image:loc><image:caption>shutterstock1144060001024x391</image:caption><image:title>shutterstock1144060001024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/eu-network-information-security-blog-featured.png</image:loc><image:caption>eunetworkinformationsecurityblogfeatured</image:caption><image:title>eunetworkinformationsecurityblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/vstar-1.png</image:loc><image:caption>vstar1</image:caption><image:title>vstar1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4).png</image:loc><image:caption>MaliciousLifeepisode4</image:caption><image:title>MaliciousLifeepisode4</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/everything-you-need-to-know-about-revil-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CXO%20Middle%20East%20logo.jpg</image:loc><image:caption>CXOMiddleEastlogo</image:caption><image:title>CXOMiddleEastlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/research/new-malware-arsenal-abusing-cloud-platforms-in-middle-east-espionage-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/molerats-blog-diagram.png</image:loc><image:caption>moleratsblogdiagram</image:caption><image:title>moleratsblogdiagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/figure-4-molerats.png</image:loc><image:caption>figure4molerats</image:caption><image:title>figure4molerats</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/molerats-malware-blog-hero-a.png</image:loc><image:caption>moleratsmalwareblogheroa</image:caption><image:title>moleratsmalwareblogheroa</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/all-3-billion-yahoo-accounts-were-hacked</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Yahoo!%20News.png</image:loc><image:caption>YahooNews</image:caption><image:title>YahooNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-14</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-intel-drive-new-silicon-enabled-ransomware-protections-for-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Icon_MalopGhost.png</image:loc><image:caption>IconMalopGhost</image:caption><image:title>IconMalopGhost</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ServiceSubPageHeader3.png</image:loc><image:caption>ServiceSubPageHeader3</image:caption><image:title>ServiceSubPageHeader3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-07-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/microsoft-confirms-windows-great-duke-of-hell-malware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes.jpg</image:loc><image:caption>Forbes</image:caption><image:title>Forbes</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2019-07-19</lastmod></url><url><loc>https://www.cybereason.com/blog/data-breaches-blame-lack-of-context</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/From%20Scripts%20to%20Systems-%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations/BLOG_Images_Template_v2%20(28).png</image:loc><image:caption>BLOGImagesTemplatev228</image:caption><image:title>BLOGImagesTemplatev228</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-29T075130.403.png</image:loc><image:caption>blogposttext20220929T075130403</image:caption><image:title>blogposttext20220929T075130403</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/valak-malware-retasked-to-steal-data-from-us-german-firms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading.png</image:loc><image:caption>DarkReading</image:caption><image:title>DarkReading</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-05-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/morning-cybersecurity-a-daily-briefing-on-politics-and-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/politics-policy-political-news-800x629-1.jpg</image:loc><image:caption>politicspolicypoliticalnews800x6291</image:caption><image:title>politicspolicypoliticalnews800x6291</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-b-side-lodrina-cherne-on-stalkerware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Lodrina-1.jpg</image:loc><image:caption>Lodrina1</image:caption><image:title>Lodrina1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/59%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>59MALICIOUSLIFE</image:caption><image:title>59MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-gets-25-million-from-an-odd-pair-consumer-focused-spark-and-defense-contractor-lockheed-martin</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/pandodaily.jpg</image:loc><image:caption>pandodaily</image:caption><image:title>pandodaily</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/leveraging-the-x-in-xdr-correlating-across-multiple-sources-of-telemetry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(52).png</image:loc><image:caption>blogposttext52</image:caption><image:title>blogposttext52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(46).png</image:loc><image:caption>blogposttext46</image:caption><image:title>blogposttext46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-12T072834.369-1.png</image:loc><image:caption>blogposttext20221012T0728343691</image:caption><image:title>blogposttext20221012T0728343691</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-03-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/why-the-russian-state-weaponised-stolen-medical-records-of-famous-footballers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/International-Business-Times.png</image:loc><image:caption>InternationalBusinessTimes</image:caption><image:title>InternationalBusinessTimes</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-chinas-unrestricted-cyberwarfare-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/s200_bill.hagestad.jpg</image:loc><image:caption>s200billhagestad</image:caption><image:title>s200billhagestad</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(10).png</image:loc><image:caption>MaliciousLifeepisode10</image:caption><image:title>MaliciousLifeepisode10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(24).png</image:loc><image:caption>MaliciousLifeepisode24</image:caption><image:title>MaliciousLifeepisode24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/108%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>108MALICIOUSLIFE</image:caption><image:title>108MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/badusb-explained-how-rogue-usbs-threaten-your-organization</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CSO%20Magazine%20logo-3.png</image:loc><image:caption>CSOMagazinelogo3</image:caption><image:title>CSOMagazinelogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-why-infosec-due-diligence-is-required-before-a-merger-and-how-to-conduct-it-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(4).png</image:loc><image:caption>CISOStoriespodcast4</image:caption><image:title>CISOStoriespodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_375748789.jpg</image:loc><image:caption>shutterstock375748789</image:caption><image:title>shutterstock375748789</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-one-thing-you-should-do-before-buying-anything-on-cyber-monday</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20News%20logo.png</image:loc><image:caption>YahooNewslogo</image:caption><image:title>YahooNewslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-12-07</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-nocturnus-researchers-discover-new-targeted-cyber-espionage-campaigns-in-the-middle-east</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-02-18</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-dfir-solution-contains-cyberattacks-in-minutes</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/aerospace-telecommunications-companies-victims-of-stealthy-iranian-cyber-espionage-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-Oct-13-2021-02-54-22-57-AM.png</image:loc><image:caption>DarkReadinglogoOct13202102542257AM</image:caption><image:title>DarkReadinglogoOct13202102542257AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/bitcoin-twitter-hack-doesnt-stop-here-cybereason-managing-director-explains</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fox%20Business%20logo.png</image:loc><image:caption>FoxBusinesslogo</image:caption><image:title>FoxBusinesslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-08-06</lastmod></url><url><loc>https://www.cybereason.com/blog/five-5-capabilities-of-a-modern-endpoint-protection-platform-epp</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-1038383026.jpg</image:loc><image:caption>GettyImages1038383026</image:caption><image:title>GettyImages1038383026</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-warns-of-fast-moving-black-basta-campaign-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Searchsecurity%20logo-Dec-12-2022-04-58-25-7901-PM.jpg</image:loc><image:caption>SearchsecuritylogoDec1220220458257901PM</image:caption><image:title>SearchsecuritylogoDec1220220458257901PM</image:title></image:image><lastmod>2022-12-12</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-motorola-mobility-real-time-network-visibility</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(49).png</image:loc><image:caption>blogposttext49</image:caption><image:title>blogposttext49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews11</image:caption><image:title>CopyofBLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2022-03-18</lastmod></url><url><loc>https://www.cybereason.com/blog/the-cybereason-difference-malop-intro</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/justin-hs-hex.png</image:loc><image:caption>justinhshex</image:caption><image:title>justinhshex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-1.png</image:loc><image:caption>CybereasonBlogTemplate31</image:caption><image:title>CybereasonBlogTemplate31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-4.png</image:loc><image:caption>blogposttext4</image:caption><image:title>blogposttext4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malop-blog.png</image:loc><image:caption>Malopblog</image:caption><image:title>Malopblog</image:title></image:image><lastmod>2021-09-14</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-launches-malicious-life-podcast</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Twitter-post-image-Malicious-Life-1024x5121.png</image:loc><image:caption>TwitterpostimageMaliciousLife1024x5121</image:caption><image:title>TwitterpostimageMaliciousLife1024x5121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20to%20Not%20Build%20a%20Cybersecurity%20Startup-1.png</image:loc><image:caption>HowtoNotBuildaCybersecurityStartup1</image:caption><image:title>HowtoNotBuildaCybersecurityStartup1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/134%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>134MALICIOUSLIFE1</image:caption><image:title>134MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/qa-with-lona-therrien-vp-of-corporate-communications-at-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/VentureFizz%20logo.png</image:loc><image:caption>VentureFizzlogo</image:caption><image:title>VentureFizzlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2022-10-20</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-named-by-the-wall-street-journal-as-a-top-25-technology-company-to-watch</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/lior-rochberger</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Lior-R-HS-1.png</image:loc><image:caption>LiorRHS1</image:caption><image:title>LiorRHS1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Prometei-botnet-featured-blog-image.png</image:loc><image:caption>Prometeibotnetfeaturedblogimage</image:caption><image:title>Prometeibotnetfeaturedblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/resources/mitre-attck-round-3-live-webinar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/mitre-r3-webinar-on-demand.png</image:loc><image:caption>mitrer3webinarondemand</image:caption><image:title>mitrer3webinarondemand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2021-04-27</lastmod></url><url><loc>https://www.cybereason.com/resources/why-and-how-the-private-sector-should-contribute-to-election-security-0</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Remote_Workforce_Whitepaper_Header_2000x574.jpg</image:loc><image:caption>RemoteWorkforceWhitepaperHeader2000x574</image:caption><image:title>RemoteWorkforceWhitepaperHeader2000x574</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/the-russian-business-network</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(9).png</image:loc><image:caption>MaliciousLifeepisode9</image:caption><image:title>MaliciousLifeepisode9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Russian%20Business%20Network.png</image:loc><image:caption>TheRussianBusinessNetwork</image:caption><image:title>TheRussianBusinessNetwork</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/operation-ivy-bells-ep-208.png</image:loc><image:caption>operationivybellsep208</image:caption><image:title>operationivybellsep208</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/deadringer-exposing-chinese-threat-actors-targeting-major-telcos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/assaf-hs-hex.png</image:loc><image:caption>assafhshex</image:caption><image:title>assafhshex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-talons-bg-ts.png</image:loc><image:caption>crtalonsbgts</image:caption><image:title>crtalonsbgts</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/more-levi-hs-hex.png</image:loc><image:caption>morelevihshex</image:caption><image:title>morelevihshex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/deadringer-webinar-on-demand-card.png</image:loc><image:caption>deadringerwebinarondemandcard</image:caption><image:title>deadringerwebinarondemandcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-08-12</lastmod></url><url><loc>https://www.cybereason.com/services/technical-account-manager</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PREVENTION_CR_ICONS-21.png</image:loc><image:caption>PREVENTIONCRICONS21</image:caption><image:title>PREVENTIONCRICONS21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR2_CR_ICONS-11.png</image:loc><image:caption>EDR2CRICONS11</image:caption><image:title>EDR2CRICONS11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--platform-02-gradient.jpg</image:loc><image:caption>crbgheroplatform02gradient</image:caption><image:title>crbgheroplatform02gradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PROTECT_ENTERPRISE_CR_ICONS-08.png</image:loc><image:caption>PROTECTENTERPRISECRICONS08</image:caption><image:title>PROTECTENTERPRISECRICONS08</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-tam-datasheet-cover.png</image:loc><image:caption>crtamdatasheetcover</image:caption><image:title>crtamdatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISION_CR_ICONS-39.svg</image:loc><image:caption>VISIONCRICONS39</image:caption><image:title>VISIONCRICONS39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/iconsand.png</image:loc><image:caption>iconsand</image:caption><image:title>iconsand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-icon-08.png</image:loc><image:caption>cricon08</image:caption><image:title>cricon08</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2025-03-28</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/andrew-tsui</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malop.png</image:loc><image:caption>Malop</image:caption><image:title>Malop</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/andrew-tsui-author.png</image:loc><image:caption>andrewtsuiauthor</image:caption><image:title>andrewtsuiauthor</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-record-emea-revenue-customer-growth</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/blog/xdr-the-next-step-in-threat-detection-and-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(72).png</image:loc><image:caption>blogposttext72</image:caption><image:title>blogposttext72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-18T125623.731.png</image:loc><image:caption>blogposttext20220718T125623731</image:caption><image:title>blogposttext20220718T125623731</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(39).png</image:loc><image:caption>CybereasonBlogTemplate39</image:caption><image:title>CybereasonBlogTemplate39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/three-reasons-big-companies-should-work-with-security-startups</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereasons-commitment-to-inclusion-in-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CybereasonBlogHeroTemplate</image:caption><image:title>CybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/lodrina.png</image:loc><image:caption>lodrina</image:caption><image:title>lodrina</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(107).png</image:loc><image:caption>blogposttext107</image:caption><image:title>blogposttext107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU-BLM.png</image:loc><image:caption>UbUBLM</image:caption><image:title>UbUBLM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-06-30</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-discovers-massive-ransomware-operation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-25</lastmod></url><url><loc>https://www.cybereason.com/blog/notpetya-intrusion-vectors-and-propagation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Eliad%20Kimhy.jpg</image:loc><image:caption>EliadKimhy</image:caption><image:title>EliadKimhy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(123).png</image:loc><image:caption>blogposttext123</image:caption><image:title>blogposttext123</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_218451523-1.jpg</image:loc><image:caption>shutterstock2184515231</image:caption><image:title>shutterstock2184515231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/notpetya_intrusion_vector_and_propagation.png</image:loc><image:caption>notpetyaintrusionvectorandpropagation</image:caption><image:title>notpetyaintrusionvectorandpropagation</image:title></image:image><lastmod>2018-01-25</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-honeypot-multistage-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Honeypot-1.png</image:loc><image:caption>Honeypot1</image:caption><image:title>Honeypot1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Israel%20Barak.jpg</image:loc><image:caption>IsraelBarak</image:caption><image:title>IsraelBarak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Honeypot-2.png</image:loc><image:caption>Honeypot2</image:caption><image:title>Honeypot2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Honeypot-3.png</image:loc><image:caption>Honeypot3</image:caption><image:title>Honeypot3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware-honeypot-blog.jpg</image:loc><image:caption>ransomwarehoneypotblog</image:caption><image:title>ransomwarehoneypotblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/2023-extended-detection-response-xdr-buyers-guide</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/exdr-buyers-guide-23-blog-featured.png</image:loc><image:caption>exdrbuyersguide23blogfeatured</image:caption><image:title>exdrbuyersguide23blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2023-10-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/this-week-in-big-data-clouds-collaboration-and-cassandra</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/gigaom.jpg</image:loc><image:caption>gigaom</image:caption><image:title>gigaom</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/taking-down-the-internet-possible-but-how-probable-3</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CSO.png</image:loc><image:caption>CSO</image:caption><image:title>CSO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/terms-of-use</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/blog/ukraine-power-company-outage-shows-the-diminishing-role-of-malware-in-complex-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-1.png</image:loc><image:caption>blogposttext1</image:caption><image:title>blogposttext1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_142082578-2-1000x391.jpg</image:loc><image:caption>shutterstock14208257821000x391</image:caption><image:title>shutterstock14208257821000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews11</image:caption><image:title>CopyofBLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/malicious-life</loc><image:image><image:loc>https://www.cybereason.com/hubfs/MaliciousLife_Brand.gif</image:loc><image:caption>MaliciousLifeBrand</image:caption><image:title>MaliciousLifeBrand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/spotify-player.png</image:loc><image:caption>spotifyplayer</image:caption><image:title>spotifyplayer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Logo%20HD-landscape.png</image:loc><image:caption>MaliciousLifeLogoHDlandscape</image:caption><image:title>MaliciousLifeLogoHDlandscape</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/All%20In%20Podcast/logos/google-play-badge.png</image:loc><image:caption>googleplaybadge</image:caption><image:title>googleplaybadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ML-spyware-ep.png</image:loc><image:caption>MLspywareep</image:caption><image:title>MLspywareep</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/lior-interview-microphone.jpg</image:loc><image:caption>liorinterviewmicrophone</image:caption><image:title>liorinterviewmicrophone</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ML_Hero_Banner.png</image:loc><image:caption>MLHeroBanner</image:caption><image:title>MLHeroBanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/All%20In%20Podcast/logos/apple-podcast-png.png</image:loc><image:caption>applepodcastpng</image:caption><image:title>applepodcastpng</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ML--epmax-headroom.png</image:loc><image:caption>MLepmaxheadroom</image:caption><image:title>MLepmaxheadroom</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/solarwinds-webinar-card-recording.png</image:loc><image:caption>solarwindswebinarcardrecording</image:caption><image:title>solarwindswebinarcardrecording</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/ransomware-ebook-card.png</image:loc><image:caption>ransomwareebookcard</image:caption><image:title>ransomwareebookcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ML-half-life-2-ep.png</image:loc><image:caption>MLhalflife2ep</image:caption><image:title>MLhalflife2ep</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/All%20In%20Podcast/logos/siteStitcher.png</image:loc><image:caption>siteStitcher</image:caption><image:title>siteStitcher</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ML-Baner-On-Demand.png</image:loc><image:caption>MLBanerOnDemand</image:caption><image:title>MLBanerOnDemand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-08-26</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-ransomware-true-cost-to-business-study-reveals-organizations-pay-multiple-ransom-demands</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-researchers-uncover-north-korean-apt-operation-targeting-government-defense-and-human-rights-groups</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-smart-tvs-a-new-security-battlefield</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(17).png</image:loc><image:caption>MaliciousLifeepisode17</image:caption><image:title>MaliciousLifeepisode17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/131%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>131MALICIOUSLIFE</image:caption><image:title>131MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2021-10-11</lastmod></url><url><loc>https://www.cybereason.com/blog/does-manual-detection-hinder-a-security-teams-productivity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews11</image:caption><image:title>CopyofBLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(74).png</image:loc><image:caption>blogposttext74</image:caption><image:title>blogposttext74</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Ebook_Seven-Signs_LP.png</image:loc><image:caption>EbookSevenSignsLP</image:caption><image:title>EbookSevenSignsLP</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_244881415-1024x391.jpg</image:loc><image:caption>shutterstock2448814151024x391</image:caption><image:title>shutterstock2448814151024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-report-printnightmare-and-magniber-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template.png</image:loc><image:caption>ThreatAlerttemplate</image:caption><image:title>ThreatAlerttemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/PrintNightmare-Magniber-Ransomware-image-2.jpg</image:loc><image:caption>PrintNightmareMagniberRansomwareimage2</image:caption><image:title>PrintNightmareMagniberRansomwareimage2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/PrintNightmare-Magniber-Ransomware-image-1a.png</image:loc><image:caption>PrintNightmareMagniberRansomwareimage1a</image:caption><image:title>PrintNightmareMagniberRansomwareimage1a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/PrintNightmare-Magniber-Ransomware-image-6.jpg</image:loc><image:caption>PrintNightmareMagniberRansomwareimage6</image:caption><image:title>PrintNightmareMagniberRansomwareimage6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/PrintNightmare-Magniber-Ransomware-image-3.jpg</image:loc><image:caption>PrintNightmareMagniberRansomwareimage3</image:caption><image:title>PrintNightmareMagniberRansomwareimage3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/PrintNightmare-Magniber-Ransomware-image-8.png</image:loc><image:caption>PrintNightmareMagniberRansomwareimage8</image:caption><image:title>PrintNightmareMagniberRansomwareimage8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-55-30-03-PM.png</image:loc><image:caption>unnamedSep14202108553003PM</image:caption><image:title>unnamedSep14202108553003PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-53-53-18-PM.png</image:loc><image:caption>unnamedSep14202108535318PM</image:caption><image:title>unnamedSep14202108535318PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/PrintNightmare-Magniber-Ransomware-image-11.png</image:loc><image:caption>PrintNightmareMagniberRansomwareimage11</image:caption><image:title>PrintNightmareMagniberRansomwareimage11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/PrintNightmare-Magniber-Ransomware-image-5.jpg</image:loc><image:caption>PrintNightmareMagniberRansomwareimage5</image:caption><image:title>PrintNightmareMagniberRansomwareimage5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/PrintNightmare-Magniber-Ransomware-image-7.jpg</image:loc><image:caption>PrintNightmareMagniberRansomwareimage7</image:caption><image:title>PrintNightmareMagniberRansomwareimage7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/PrintNightmare-Magniber-Ransomware-image-10.png</image:loc><image:caption>PrintNightmareMagniberRansomwareimage10</image:caption><image:title>PrintNightmareMagniberRansomwareimage10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(5).png</image:loc><image:caption>ThreatAlerttemplate5</image:caption><image:title>ThreatAlerttemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/PrintNightmare-Magniber-Ransomware-image-9.png</image:loc><image:caption>PrintNightmareMagniberRansomwareimage9</image:caption><image:title>PrintNightmareMagniberRansomwareimage9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/PrintNightmare-Magniber-Ransomware-image-4.jpg</image:loc><image:caption>PrintNightmareMagniberRansomwareimage4</image:caption><image:title>PrintNightmareMagniberRansomwareimage4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(84).png</image:loc><image:caption>blogposttext84</image:caption><image:title>blogposttext84</image:title></image:image><lastmod>2022-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/whats-on-the-smartest-cybersecurity-minds-for-2024</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/smartest-cybersecurity-minds-2024-blog-featured.png</image:loc><image:caption>smartestcybersecurityminds2024blogfeatured</image:caption><image:title>smartestcybersecurityminds2024blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2025%20PREDICTIONS%20BY%20GREG%20DAY.jpg</image:loc><image:caption>2025PREDICTIONSBYGREGDAY</image:caption><image:title>2025PREDICTIONSBYGREGDAY</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Cybersecurity-Capability-Industry-Nearly-Forgot.png</image:loc><image:caption>CybersecurityCapabilityIndustryNearlyForgot</image:caption><image:title>CybersecurityCapabilityIndustryNearlyForgot</image:title></image:image><lastmod>2024-01-16</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/security-startup-cybereason-raises-25m.-cybereason-also-entered-into-a-strategic-partnership-with-investor-lockheed-martin</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/vator_tv.jpg</image:loc><image:caption>vatortv</image:caption><image:title>vatortv</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/ngav-redefined-9-layers-of-unparalleled-attack-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_525665947_2000x800px.jpg</image:loc><image:caption>shutterstock5256659472000x800px</image:caption><image:title>shutterstock5256659472000x800px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/NGAV_9_Layers_Ebook_October_2022.png</image:loc><image:caption>NGAV9LayersEbookOctober2022</image:caption><image:title>NGAV9LayersEbookOctober2022</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_164662400_Yellow_2000x1100px.jpg</image:loc><image:caption>shutterstock164662400Yellow2000x1100px</image:caption><image:title>shutterstock164662400Yellow2000x1100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV-redefined-blog-post-text.png</image:loc><image:caption>NGAVredefinedblogposttext</image:caption><image:title>NGAVredefinedblogposttext</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_564496483_Yellow_2000x1100px.jpg</image:loc><image:caption>shutterstock564496483Yellow2000x1100px</image:caption><image:title>shutterstock564496483Yellow2000x1100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV_Redefined_ebook_111422_Page_01.png</image:loc><image:caption>NGAVRedefinedebook111422Page01</image:caption><image:title>NGAVRedefinedebook111422Page01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WINNTI_GRAPHIC_1200x1200px.png</image:loc><image:caption>WINNTIGRAPHIC1200x1200px</image:caption><image:title>WINNTIGRAPHIC1200x1200px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_674688880_2000x1200px.jpg</image:loc><image:caption>shutterstock6746888802000x1200px</image:caption><image:title>shutterstock6746888802000x1200px</image:title></image:image><lastmod>2022-11-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uber-breach-will-have-likely-attorneys-generals-salivating</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CBS-News.png</image:loc><image:caption>CBSNews</image:caption><image:title>CBSNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-warfare-is-here</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Boston%20Herald-4.png</image:loc><image:caption>BostonHerald4</image:caption><image:title>BostonHerald4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2019-07-01</lastmod></url><url><loc>https://www.cybereason.com/blog/why-antivirus-software-is-becoming-the-rootkit-you-pay-for</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Untitled%20design%20(80).jpg</image:loc><image:caption>Untitleddesign80</image:caption><image:title>Untitleddesign80</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(15).png</image:loc><image:caption>BLOGImagesTemplatev215</image:caption><image:title>BLOGImagesTemplatev215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(11).png</image:loc><image:caption>BLOGImagesTemplatev211</image:caption><image:title>BLOGImagesTemplatev211</image:title></image:image><lastmod>2017-12-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-executives-ghazal-asif-and-joe-odonnell-named-2020-crn-channel-chiefs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-03-05</lastmod></url><url><loc>https://www.cybereason.com/blog/metrics-that-matter-that-new-metrics-for-it-security-program-effectiveness</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/darkgate-featured.png</image:loc><image:caption>darkgatefeatured</image:caption><image:title>darkgatefeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/activemq-blog-featured.png</image:loc><image:caption>activemqblogfeatured</image:caption><image:title>activemqblogfeatured</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/when-advanced-threats-are-on-the-rise-security-focus-more-on-endpoints</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(9)-1.png</image:loc><image:caption>CybereasonBlogTemplate91</image:caption><image:title>CybereasonBlogTemplate91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-how-to-prevent-your-christmas-gift-from-joining-the-mirai-botnet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xy-backdoor-blog-featured.png</image:loc><image:caption>xybackdoorblogfeatured</image:caption><image:title>xybackdoorblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_269827610.jpg</image:loc><image:caption>shutterstock269827610</image:caption><image:title>shutterstock269827610</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-hires-hussam-sidani-as-regional-vice-president-to-fuel-growth-in-the-middle-east-and-turkey</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tahawul%20Tech%20logo-May-09-2022-03-27-06-77-PM.jpg</image:loc><image:caption>TahawulTechlogoMay09202203270677PM</image:caption><image:title>TahawulTechlogoMay09202203270677PM</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-extends-global-leadership-in-xdr-with-275-million-in-crossover-financing</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(19).png</image:loc><image:caption>image19</image:caption><image:title>image19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><lastmod>2022-02-23</lastmod></url><url><loc>https://www.cybereason.com/services/mdr-core-bundle</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-mdr-core-thumbnail.jpg</image:loc><image:caption>crmdrcorethumbnail</image:caption><image:title>crmdrcorethumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/GMAIL_CR_ICONS_BATCH_2%20copy-25.svg</image:loc><image:caption>GMAILCRICONSBATCH2copy25</image:caption><image:title>GMAILCRICONSBATCH2copy25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-ltgray-03.png</image:loc><image:caption>crbgsubtleltgray03</image:caption><image:title>crbgsubtleltgray03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/chart-icon-dash.svg</image:loc><image:caption>charticondash</image:caption><image:title>charticondash</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR2_CR_ICONS-11.png</image:loc><image:caption>EDR2CRICONS11</image:caption><image:title>EDR2CRICONS11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/chart-icon-check.svg</image:loc><image:caption>charticoncheck</image:caption><image:title>charticoncheck</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISION_CR_ICONS-39.svg</image:loc><image:caption>VISIONCRICONS39</image:caption><image:title>VISIONCRICONS39</image:title></image:image><lastmod>2022-10-19</lastmod></url><url><loc>https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-May-02-2022-08-50-17-72-PM.png</image:loc><image:caption>CaptureMay02202208501772PM</image:caption><image:title>CaptureMay02202208501772PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(96).png</image:loc><image:caption>blogposttext96</image:caption><image:title>blogposttext96</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(88).png</image:loc><image:caption>blogposttext88</image:caption><image:title>blogposttext88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-05-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iran-linked-malkamak-hackers-targeting-aerospace-telcos-with-shellclient-rat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Week%20logo-Oct-13-2021-03-00-16-47-AM.png</image:loc><image:caption>SecurityWeeklogoOct13202103001647AM</image:caption><image:title>SecurityWeeklogoOct13202103001647AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/blog/five-most-common-cyberattacks-myths-revealed</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-data-management.png</image:loc><image:caption>cybereasonxdrdatamanagement</image:caption><image:title>cybereasonxdrdatamanagement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/betabot-banking-trojan-neurevt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-10.png</image:loc><image:caption>image410</image:caption><image:title>image410</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-8.png</image:loc><image:caption>image158</image:caption><image:title>image158</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image29-1.png</image:loc><image:caption>image291</image:caption><image:title>image291</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-5.png</image:loc><image:caption>image165</image:caption><image:title>image165</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image37-1.png</image:loc><image:caption>image371</image:caption><image:title>image371</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-4.png</image:loc><image:caption>image244</image:caption><image:title>image244</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-19.png</image:loc><image:caption>image119</image:caption><image:title>image119</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-9.png</image:loc><image:caption>image139</image:caption><image:title>image139</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-5.png</image:loc><image:caption>image205</image:caption><image:title>image205</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image25-1.png</image:loc><image:caption>image251</image:caption><image:title>image251</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image28-2.png</image:loc><image:caption>image282</image:caption><image:title>image282</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-9.png</image:loc><image:caption>image149</image:caption><image:title>image149</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image35-2.png</image:loc><image:caption>image352</image:caption><image:title>image352</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-4.png</image:loc><image:caption>image214</image:caption><image:title>image214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27-2.png</image:loc><image:caption>image272</image:caption><image:title>image272</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image31-2.png</image:loc><image:caption>image312</image:caption><image:title>image312</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-8.png</image:loc><image:caption>image108</image:caption><image:title>image108</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AI%20Hunting%20Tour/Ai_Hunting_Header.jpg</image:loc><image:caption>AiHuntingHeader</image:caption><image:title>AiHuntingHeader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image36-2.png</image:loc><image:caption>image362</image:caption><image:title>image362</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-8.png</image:loc><image:caption>image98</image:caption><image:title>image98</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-6.png</image:loc><image:caption>image176</image:caption><image:title>image176</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-5.png</image:loc><image:caption>image195</image:caption><image:title>image195</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-part-1-analysis-blog-analysis-featured.png</image:loc><image:caption>cuckoospearpart1analysisbloganalysisfeatured</image:caption><image:title>cuckoospearpart1analysisbloganalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-pt-2-featured.png</image:loc><image:caption>cuckoospearpt2featured</image:caption><image:title>cuckoospearpt2featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image38-1.png</image:loc><image:caption>image381</image:caption><image:title>image381</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-3.png</image:loc><image:caption>image233</image:caption><image:title>image233</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-11.png</image:loc><image:caption>image511</image:caption><image:title>image511</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image22-3.png</image:loc><image:caption>image223</image:caption><image:title>image223</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image33-3.png</image:loc><image:caption>image333</image:caption><image:title>image333</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-8.png</image:loc><image:caption>image68</image:caption><image:title>image68</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-9.png</image:loc><image:caption>image79</image:caption><image:title>image79</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-7.png</image:loc><image:caption>image117</image:caption><image:title>image117</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-11.png</image:loc><image:caption>image811</image:caption><image:title>image811</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-5.png</image:loc><image:caption>image185</image:caption><image:title>image185</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-15.png</image:loc><image:caption>image215</image:caption><image:title>image215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-8.png</image:loc><image:caption>image128</image:caption><image:title>image128</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image26-1.png</image:loc><image:caption>image261</image:caption><image:title>image261</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image34-2.png</image:loc><image:caption>image342</image:caption><image:title>image342</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-12.png</image:loc><image:caption>image312</image:caption><image:title>image312</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image30-1.png</image:loc><image:caption>image301</image:caption><image:title>image301</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image32-2.png</image:loc><image:caption>image322</image:caption><image:title>image322</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-america-the-meek-pranking-north-korea-and-the-dysfunction-in-u-s-cyber-command</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(4).png</image:loc><image:caption>CISOStoriespodcast4</image:caption><image:title>CISOStoriespodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/dprk-uscc.jpg</image:loc><image:caption>dprkuscc</image:caption><image:title>dprkuscc</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-ciso-priorities-for-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISOStories%20(1).png</image:loc><image:caption>CISOStories1</image:caption><image:title>CISOStories1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Mark-Varner-circle.png</image:loc><image:caption>MarkVarnercircle</image:caption><image:title>MarkVarnercircle</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Devon-Bryan-circle.png</image:loc><image:caption>DevonBryancircle</image:caption><image:title>DevonBryancircle</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Richard-Rushing-circle.png</image:loc><image:caption>RichardRushingcircle</image:caption><image:title>RichardRushingcircle</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Sydney-Klein-circle.png</image:loc><image:caption>SydneyKleincircle</image:caption><image:title>SydneyKleincircle</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(8).png</image:loc><image:caption>CISOStoriespodcast8</image:caption><image:title>CISOStoriespodcast8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ukraine-invasion-what-if-us-strikes-back-against-russia</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-Mar-01-2022-11-18-13-74-PM.png</image:loc><image:caption>DatabreachtodaylogoMar01202211181374PM</image:caption><image:title>DatabreachtodaylogoMar01202211181374PM</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-who-is-your-soc-really-for</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ricardo%20Lafosse.png</image:loc><image:caption>RicardoLafosse</image:caption><image:title>RicardoLafosse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(4).png</image:loc><image:caption>CISOStoriespodcast4</image:caption><image:title>CISOStoriespodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-01-25</lastmod></url><url><loc>https://www.cybereason.com/blog/mac-osx-attackers-dont-discriminate</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(18).png</image:loc><image:caption>BLOGImagesTemplatev218</image:caption><image:title>BLOGImagesTemplatev218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_734777938.jpg</image:loc><image:caption>shutterstock734777938</image:caption><image:title>shutterstock734777938</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/goot-loader-blog-featured.png</image:loc><image:caption>gootloaderblogfeatured</image:caption><image:title>gootloaderblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-07-30</lastmod></url><url><loc>https://www.cybereason.com/consulting/cyber-crisis-communications</loc><image:image><image:loc>https://www.cybereason.com/hubfs/michael-quinn.webp</image:loc><image:caption>michaelquinn</image:caption><image:title>michaelquinn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Mitre%20Blog%202026.png</image:loc><image:caption>CybereasonMitreBlog2026</image:caption><image:title>CybereasonMitreBlog2026</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(36).png</image:loc><image:caption>BLOGImagesTemplatev236</image:caption><image:title>BLOGImagesTemplatev236</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-yellow-divider-line.png</image:loc><image:caption>cybereasonyellowdividerline</image:caption><image:title>cybereasonyellowdividerline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/denman-headshot.png</image:loc><image:caption>denmanheadshot</image:caption><image:title>denmanheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ATTACK_GOAL_CR_ICONS-33.svg</image:loc><image:caption>ATTACKGOALCRICONS33</image:caption><image:title>ATTACKGOALCRICONS33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-gen-feat-img-web.png</image:loc><image:caption>cybereasongenfeatimgweb</image:caption><image:title>cybereasongenfeatimgweb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chris%20White%20web%20headshot%20treated.png</image:loc><image:caption>ChrisWhitewebheadshottreated</image:caption><image:title>ChrisWhitewebheadshottreated</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/Headshots/Chris%20White%20Headshot.png</image:loc><image:caption>ChrisWhiteHeadshot</image:caption><image:title>ChrisWhiteHeadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR2_CR_ICONS-11.png</image:loc><image:caption>EDR2CRICONS11</image:caption><image:title>EDR2CRICONS11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PROACTIVE_THREATHUNTING_CR_ICONS-25.svg</image:loc><image:caption>PROACTIVETHREATHUNTINGCRICONS25</image:caption><image:title>PROACTIVETHREATHUNTINGCRICONS25</image:title></image:image><lastmod>2025-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-board-business-sec-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_135291431.jpg</image:loc><image:caption>shutterstock135291431</image:caption><image:title>shutterstock135291431</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10XThreat.png</image:loc><image:caption>10XThreat</image:caption><image:title>10XThreat</image:title></image:image><lastmod>2018-05-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/colonial-pipeline-attack-a-wake-up-call-about-the-threat-of-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNN%20logo-4.png</image:loc><image:caption>CNNlogo4</image:caption><image:title>CNNlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-05-19</lastmod></url><url><loc>https://www.cybereason.com/blog/evaluating-open-xdr-vs.-native-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/XDR.png</image:loc><image:caption>XDR</image:caption><image:title>XDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(73).png</image:loc><image:caption>blogposttext73</image:caption><image:title>blogposttext73</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(28).png</image:loc><image:caption>blogposttext28</image:caption><image:title>blogposttext28</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/were-always-ready-would-the-u.s.-win-a-cyberwar-with-iran</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fast%20Company%20logo.png</image:loc><image:caption>FastCompanylogo</image:caption><image:title>FastCompanylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-01-16</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-to-cnbcs-2021-disruptor-50-list</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-05-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinese-hackers-cast-wide-net-for-trade-secrets-in-us-europe-and-asia-researchers-say</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNN%20logo-May-09-2022-02-35-07-62-PM.png</image:loc><image:caption>CNNlogoMay09202202350762PM</image:caption><image:title>CNNlogoMay09202202350762PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/partners/managed-security-service-provider-partners</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-wing.png</image:loc><image:caption>crbgherobluesubtlewithwing</image:caption><image:title>crbgherobluesubtlewithwing</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/nbm-malop-graphic.png</image:loc><image:caption>nbmmalopgraphic</image:caption><image:title>nbmmalopgraphic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/malop-1-blurred.gif</image:loc><image:caption>malop1blurred</image:caption><image:title>malop1blurred</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/cr-interface-sensor-dashboard.png</image:loc><image:caption>crinterfacesensordashboard</image:caption><image:title>crinterfacesensordashboard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-subtle-white-04.png</image:loc><image:caption>crbgsubtlewhite04</image:caption><image:title>crbgsubtlewhite04</image:title></image:image><lastmod>2024-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ai-will-change-the-face-of-security-but-is-it-still-the-stuff-of-sci-fi</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/help-net-security.jpg</image:loc><image:caption>helpnetsecurity</image:caption><image:title>helpnetsecurity</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/softbank-corp-invests-100-million-into-cybersecurity-start-up-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CNBC_logo.svg_.png</image:loc><image:caption>CNBClogosvg</image:caption><image:title>CNBClogosvg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-target-russian-federal-air-transport-agency</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Apr-03-2022-11-06-10-07-PM.png</image:loc><image:caption>BankinfosecuritylogoApr03202211061007PM</image:caption><image:title>BankinfosecuritylogoApr03202211061007PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-04-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cathay-pacific-breach-are-you-one-of-the-9.4m-passengers-whose-data-was-hacked</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/forbes-logo-2.gif</image:loc><image:caption>forbeslogo2</image:caption><image:title>forbeslogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-11-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-kevin-mitnick-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-236-card.png</image:loc><image:caption>mlep236card</image:caption><image:title>mlep236card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><lastmod>2024-05-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/british-airways-breach-airline-industry-too-lax-on-cybersecurity-experts-warn</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict-Logo-1.jpg</image:loc><image:caption>VerdictLogo1</image:caption><image:title>VerdictLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2018-09-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/manufacturing-attacks-up-in-q2-as-credential-theft-threat-continues-to-grow</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-3.png</image:loc><image:caption>SCMagazine3</image:caption><image:title>SCMagazine3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-08-23</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-the-unpatchable-vulnerability-that-is-human-nature</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(3).png</image:loc><image:caption>CISOStoriespodcast3</image:caption><image:title>CISOStoriespodcast3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-1.png</image:loc><image:caption>CISOStoriestemplate41</image:caption><image:title>CISOStoriestemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Rachel%20Tobac.png</image:loc><image:caption>RachelTobac</image:caption><image:title>RachelTobac</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(2).png</image:loc><image:caption>CISOStoriespodcast2</image:caption><image:title>CISOStoriespodcast2</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/maintenance-and-support</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2024-05-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/starting-a-discussion-on-machine-learning</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Infoworld.png</image:loc><image:caption>Infoworld</image:caption><image:title>Infoworld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/law-enforcement-warns-of-imminent-ransomware-threat-to-u.s.-hospitals</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template-2.png</image:loc><image:caption>CybereasonBlogTemplate2</image:caption><image:title>CybereasonBlogTemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-2.png</image:loc><image:caption>CybereasonBlogTemplate32</image:caption><image:title>CybereasonBlogTemplate32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kyle_headshot.jpeg</image:loc><image:caption>kyleheadshot</image:caption><image:title>kyleheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Healthcare%20Industry%20-%20image%20with%20filter%20and%20textures%20(2).png</image:loc><image:caption>HealthcareIndustryimagewithfilterandtextures2</image:caption><image:title>HealthcareIndustryimagewithfilterandtextures2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/advanced-hackers-targeted-palestinian-officials-experts-say</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UPI%20logo.jpg</image:loc><image:caption>UPIlogo</image:caption><image:title>UPIlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-02-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/honeypot-experiment-shows-the-commoditization-of-using-bots-to-perform-low-level-hacking-tasks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Securityweek-logo.jpg</image:loc><image:caption>Securityweeklogo</image:caption><image:title>Securityweeklogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2018-04-23</lastmod></url><url><loc>https://www.cybereason.com/fundamentals/what-is-threat-hunting</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/dark-metal-background.png</image:loc><image:caption>darkmetalbackground</image:caption><image:title>darkmetalbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/101-what-is-threat-hunting-featured.png</image:loc><image:caption>101whatisthreathuntingfeatured</image:caption><image:title>101whatisthreathuntingfeatured</image:title></image:image><lastmod>2023-04-20</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-when-communicating-infosec-let-the-audience-determine-the-message</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_643328797.png</image:loc><image:caption>shutterstock643328797</image:caption><image:title>shutterstock643328797</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-data-management.png</image:loc><image:caption>cybereasonxdrdatamanagement</image:caption><image:title>cybereasonxdrdatamanagement</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/shadowwali-malware-discovered-attacking-japan-since-2015</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Infosecurity-Magazine.png</image:loc><image:caption>InfosecurityMagazine</image:caption><image:title>InfosecurityMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-pixel-tracking-assessment</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pixel-tracking-security-assessment.jpg</image:loc><image:caption>pixeltrackingsecurityassessment</image:caption><image:title>pixeltrackingsecurityassessment</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2025-09-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-gear-up-to-target-winter-olympics</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/betanews.png</image:loc><image:caption>betanews</image:caption><image:title>betanews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/covid-19-pandemic-shapes-and-accelerates-the-future-of-work-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Techspective%20logo.png</image:loc><image:caption>Techspectivelogo</image:caption><image:title>Techspectivelogo</image:title></image:image><lastmod>2020-08-06</lastmod></url><url><loc>https://www.cybereason.com/blog/preparing-your-organization-for-a-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-19T122257.609.png</image:loc><image:caption>blogposttext20220919T122257609</image:caption><image:title>blogposttext20220919T122257609</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR_XDR.png</image:loc><image:caption>EDRXDR</image:caption><image:title>EDRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-06T070615.090.png</image:loc><image:caption>blogposttext20220906T070615090</image:caption><image:title>blogposttext20220906T070615090</image:title></image:image><lastmod>2022-09-20</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-masscybercenter-partner-to-mentor-college-students</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MassCyberCenter-blog-1.png</image:loc><image:caption>MassCyberCenterblog1</image:caption><image:title>MassCyberCenterblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-21T133543.854.png</image:loc><image:caption>blogposttext20220621T133543854</image:caption><image:title>blogposttext20220621T133543854</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/darkgate-featured.png</image:loc><image:caption>darkgatefeatured</image:caption><image:title>darkgatefeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-01-05</lastmod></url><url><loc>https://www.cybereason.com/blog/labs-proton-b-what-this-mac-malware-actually-does</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/proton%20B/asset%206.png</image:loc><image:caption>asset6</image:caption><image:title>asset6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Screen-Shot-2017-05-10-at-5_37_29-PM-1.png</image:loc><image:caption>ScreenShot20170510at53729PM1</image:caption><image:title>ScreenShot20170510at53729PM1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/proton%20B/asset%209.png</image:loc><image:caption>asset9</image:caption><image:title>asset9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/proton%20B/shutterstock_383381101-1.jpg</image:loc><image:caption>shutterstock3833811011</image:caption><image:title>shutterstock3833811011</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/proton%20B/asset%2012.png</image:loc><image:caption>asset12</image:caption><image:title>asset12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/proton%20B/asset%208.png</image:loc><image:caption>asset8</image:caption><image:title>asset8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image6-3.png</image:loc><image:caption>image63</image:caption><image:title>image63</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image4-1.png</image:loc><image:caption>image41</image:caption><image:title>image41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/proton%20B/asset%205.png</image:loc><image:caption>asset5</image:caption><image:title>asset5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image2-4.png</image:loc><image:caption>image24</image:caption><image:title>image24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/image1-1.jpg</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/will-russia-go-to-war-in-cyberspace</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Boston%20Globe%20logo-3.png</image:loc><image:caption>BostonGlobelogo3</image:caption><image:title>BostonGlobelogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-look-at-linkedins-top-50-companies-startups</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Business%20Insider%20logo.png</image:loc><image:caption>BusinessInsiderlogo</image:caption><image:title>BusinessInsiderlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-nuspire-announce-partnership-to-empower-organizations-across-north-america-to-stop-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-12</lastmod></url><url><loc>https://www.cybereason.com/blog/2024-cybersecurity-predictions-generative-ai-reshapes-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/2024-Cybersecurity-Predictions%20-%20Generative-GD-Featured.png</image:loc><image:caption>2024CybersecurityPredictionsGenerativeGDFeatured</image:caption><image:title>2024CybersecurityPredictionsGenerativeGDFeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/smartest-cybersecurity-minds-2024-blog-featured.png</image:loc><image:caption>smartestcybersecurityminds2024blogfeatured</image:caption><image:title>smartestcybersecurityminds2024blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Cybersecurity-Capability-Industry-Nearly-Forgot.png</image:loc><image:caption>CybersecurityCapabilityIndustryNearlyForgot</image:caption><image:title>CybersecurityCapabilityIndustryNearlyForgot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2024-01-10</lastmod></url><url><loc>https://www.cybereason.com/resources/attackers-use-botnets-to-break-into-networks-faster</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Honeypot_Header-1.jpg</image:loc><image:caption>HoneypotHeader1</image:caption><image:title>HoneypotHeader1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-04-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/china-declares-all-cryptocurrency-transactions-illegal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Intelligent%20CISO%20logo-2.jpg</image:loc><image:caption>IntelligentCISOlogo2</image:caption><image:title>IntelligentCISOlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/press/levelblue-to-acquire-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Banner-1.png</image:loc><image:caption>Banner1</image:caption><image:title>Banner1</image:title></image:image><lastmod>2025-10-14</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-stuxnet-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/8%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>8MALICIOUSLIFE1</image:caption><image:title>8MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Andrew%20Ginter.png</image:loc><image:caption>AndrewGinter</image:caption><image:title>AndrewGinter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/how-countries-can-lose-the-internet-ep-213.png</image:loc><image:caption>howcountriescanlosetheinternetep213</image:caption><image:title>howcountriescanlosetheinternetep213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/131%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>131MALICIOUSLIFE</image:caption><image:title>131MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sobczak_Blake_photo.jpg</image:loc><image:caption>SobczakBlakephoto</image:caption><image:title>SobczakBlakephoto</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/blog/three-keys-to-a-reliable-ransomware-defense-strategy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG-May-04-2021-01-46-52-76-PM.png</image:loc><image:caption>BLOGMay04202101465276PM</image:caption><image:title>BLOGMay04202101465276PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(75).png</image:loc><image:caption>blogposttext75</image:caption><image:title>blogposttext75</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-report-ragnar-locker-ransomware-targeting-the-energy-sector</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Aug-30-2022-06-31-01-20-PM.png</image:loc><image:caption>image5Aug30202206310120PM</image:caption><image:title>image5Aug30202206310120PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Aug-30-2022-06-04-23-18-PM.png</image:loc><image:caption>image15Aug30202206042318PM</image:caption><image:title>image15Aug30202206042318PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image26-Aug-30-2022-06-27-07-68-PM.png</image:loc><image:caption>image26Aug30202206270768PM</image:caption><image:title>image26Aug30202206270768PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-Aug-30-2022-05-44-36-81-PM.png</image:loc><image:caption>image20Aug30202205443681PM</image:caption><image:title>image20Aug30202205443681PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image31-Aug-30-2022-06-06-23-01-PM.png</image:loc><image:caption>image31Aug30202206062301PM</image:caption><image:title>image31Aug30202206062301PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Aug-30-2022-06-22-50-00-PM.png</image:loc><image:caption>image13Aug30202206225000PM</image:caption><image:title>image13Aug30202206225000PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Aug-30-2022-06-21-05-29-PM.png</image:loc><image:caption>image1Aug30202206210529PM</image:caption><image:title>image1Aug30202206210529PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Aug-30-2022-06-13-02-00-PM.png</image:loc><image:caption>image10Aug30202206130200PM</image:caption><image:title>image10Aug30202206130200PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image35-Aug-30-2022-05-33-24-46-PM.png</image:loc><image:caption>image35Aug30202205332446PM</image:caption><image:title>image35Aug30202205332446PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Aug-30-2022-06-03-16-68-PM.png</image:loc><image:caption>image11Aug30202206031668PM</image:caption><image:title>image11Aug30202206031668PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-Aug-30-2022-05-35-17-98-PM.png</image:loc><image:caption>image18Aug30202205351798PM</image:caption><image:title>image18Aug30202205351798PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-Aug-30-2022-06-13-52-68-PM.png</image:loc><image:caption>image21Aug30202206135268PM</image:caption><image:title>image21Aug30202206135268PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(125).png</image:loc><image:caption>blogposttext125</image:caption><image:title>blogposttext125</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Aug-30-2022-06-27-45-08-PM.png</image:loc><image:caption>image14Aug30202206274508PM</image:caption><image:title>image14Aug30202206274508PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Aug-30-2022-05-28-15-40-PM.png</image:loc><image:caption>image6Aug30202205281540PM</image:caption><image:title>image6Aug30202205281540PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27-Aug-30-2022-06-14-56-00-PM.png</image:loc><image:caption>image27Aug30202206145600PM</image:caption><image:title>image27Aug30202206145600PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T093119.758.png</image:loc><image:caption>blogposttext20220830T093119758</image:caption><image:title>blogposttext20220830T093119758</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Aug-30-2022-06-21-48-23-PM.png</image:loc><image:caption>image12Aug30202206214823PM</image:caption><image:title>image12Aug30202206214823PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image25-Aug-30-2022-05-30-42-68-PM.png</image:loc><image:caption>image25Aug30202205304268PM</image:caption><image:title>image25Aug30202205304268PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image30-Aug-30-2022-05-25-00-35-PM.png</image:loc><image:caption>image30Aug30202205250035PM</image:caption><image:title>image30Aug30202205250035PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-Aug-30-2022-06-23-51-92-PM.png</image:loc><image:caption>image24Aug30202206235192PM</image:caption><image:title>image24Aug30202206235192PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Aug-30-2022-05-26-57-14-PM.png</image:loc><image:caption>image3Aug30202205265714PM</image:caption><image:title>image3Aug30202205265714PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Aug-30-2022-06-16-25-58-PM.png</image:loc><image:caption>image16Aug30202206162558PM</image:caption><image:title>image16Aug30202206162558PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image33-Aug-30-2022-06-28-40-42-PM.png</image:loc><image:caption>image33Aug30202206284042PM</image:caption><image:title>image33Aug30202206284042PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-Aug-30-2022-05-29-07-60-PM.png</image:loc><image:caption>image23Aug30202205290760PM</image:caption><image:title>image23Aug30202205290760PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Aug-30-2022-06-11-59-58-PM.png</image:loc><image:caption>image4Aug30202206115958PM</image:caption><image:title>image4Aug30202206115958PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image36.jpg</image:loc><image:caption>image36</image:caption><image:title>image36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Aug-30-2022-06-17-10-09-PM.png</image:loc><image:caption>image2Aug30202206171009PM</image:caption><image:title>image2Aug30202206171009PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image37-Aug-30-2022-06-24-48-48-PM.png</image:loc><image:caption>image37Aug30202206244848PM</image:caption><image:title>image37Aug30202206244848PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image29-Aug-30-2022-06-25-26-49-PM.png</image:loc><image:caption>image29Aug30202206252649PM</image:caption><image:title>image29Aug30202206252649PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image32-Aug-30-2022-06-05-35-42-PM.png</image:loc><image:caption>image32Aug30202206053542PM</image:caption><image:title>image32Aug30202206053542PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Aug-30-2022-06-08-41-11-PM.png</image:loc><image:caption>image7Aug30202206084111PM</image:caption><image:title>image7Aug30202206084111PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Aug-30-2022-05-31-47-78-PM.png</image:loc><image:caption>image9Aug30202205314778PM</image:caption><image:title>image9Aug30202205314778PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image28-Aug-30-2022-05-39-06-67-PM.png</image:loc><image:caption>image28Aug30202205390667PM</image:caption><image:title>image28Aug30202205390667PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image34-Aug-30-2022-06-18-28-49-PM.png</image:loc><image:caption>image34Aug30202206182849PM</image:caption><image:title>image34Aug30202206182849PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image22-Aug-30-2022-06-22-11-80-PM.png</image:loc><image:caption>image22Aug30202206221180PM</image:caption><image:title>image22Aug30202206221180PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(13).png</image:loc><image:caption>BLOGImagesTemplatev213</image:caption><image:title>BLOGImagesTemplatev213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-Aug-30-2022-06-09-34-07-PM.png</image:loc><image:caption>image17Aug30202206093407PM</image:caption><image:title>image17Aug30202206093407PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-Aug-30-2022-06-07-37-78-PM.png</image:loc><image:caption>image19Aug30202206073778PM</image:caption><image:title>image19Aug30202206073778PM</image:title></image:image><lastmod>2022-09-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/killnet-ddos-attacks-disrupt-nato-websites</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-Feb-14-2023-02-40-36-1568-AM.png</image:loc><image:caption>ComputerWeeklylogoFeb1420230240361568AM</image:caption><image:title>ComputerWeeklylogoFeb1420230240361568AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-02-14</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-exposes-malware-targeting-us-taxpayers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-03-01%20at%2019.07.09.png</image:loc><image:caption>ScreenShot20210301at190709</image:caption><image:title>ScreenShot20210301at190709</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-02-22%20at%2017.44.11.png</image:loc><image:caption>ScreenShot20210222at174411</image:caption><image:title>ScreenShot20210222at174411</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Campaign%20Targeting%20US%20Taxpayers.png</image:loc><image:caption>CampaignTargetingUSTaxpayers</image:caption><image:title>CampaignTargetingUSTaxpayers</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-02-22%20at%2017.18.51.png</image:loc><image:caption>ScreenShot20210222at171851</image:caption><image:title>ScreenShot20210222at171851</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-02-25%20at%2012.06.02.png</image:loc><image:caption>ScreenShot20210225at120602</image:caption><image:title>ScreenShot20210225at120602</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-02-14%20at%2013.17.15.png</image:loc><image:caption>ScreenShot20210214at131715</image:caption><image:title>ScreenShot20210214at131715</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-02-25%20at%2012.03.02.png</image:loc><image:caption>ScreenShot20210225at120302</image:caption><image:title>ScreenShot20210225at120302</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed%20(1).png</image:loc><image:caption>unnamed1</image:caption><image:title>unnamed1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-03-14%20at%2014.24.55.png</image:loc><image:caption>ScreenShot20210314at142455</image:caption><image:title>ScreenShot20210314at142455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-02-14%20at%2013.18.53.png</image:loc><image:caption>ScreenShot20210214at131853</image:caption><image:title>ScreenShot20210214at131853</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-02-22%20at%2017.21.37.png</image:loc><image:caption>ScreenShot20210222at172137</image:caption><image:title>ScreenShot20210222at172137</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-02-22%20at%2016.56.07.png</image:loc><image:caption>ScreenShot20210222at165607</image:caption><image:title>ScreenShot20210222at165607</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-02-22%20at%2018.07.16.png</image:loc><image:caption>ScreenShot20210222at180716</image:caption><image:title>ScreenShot20210222at180716</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-03-01%20at%2018.54.18.png</image:loc><image:caption>ScreenShot20210301at185418</image:caption><image:title>ScreenShot20210301at185418</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-4.png</image:loc><image:caption>unnamed4</image:caption><image:title>unnamed4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-02-22%20at%2019.18.07.png</image:loc><image:caption>ScreenShot20210222at191807</image:caption><image:title>ScreenShot20210222at191807</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/tax%20infographics%202.png</image:loc><image:caption>taxinfographics2</image:caption><image:title>taxinfographics2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200-4.png</image:loc><image:caption>pastedimage04</image:caption><image:title>pastedimage04</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-02-18%20at%2017.57.31.png</image:loc><image:caption>ScreenShot20210218at175731</image:caption><image:title>ScreenShot20210218at175731</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202021-03-01%20at%2016.40.00.png</image:loc><image:caption>ScreenShot20210301at164000</image:caption><image:title>ScreenShot20210301at164000</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><lastmod>2021-06-14</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/justin-buchanan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-4.png</image:loc><image:caption>blogposttext4</image:caption><image:title>blogposttext4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20advances%20prevention%20data%20collection.png</image:loc><image:caption>Cybereasonadvancespreventiondatacollection</image:caption><image:title>Cybereasonadvancespreventiondatacollection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malop-blog.png</image:loc><image:caption>Malopblog</image:caption><image:title>Malopblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/pentesters-valentines-day-blog-card.png</image:loc><image:caption>pentestersvalentinesdayblogcard</image:caption><image:title>pentestersvalentinesdayblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/justin-hs-hex.png</image:loc><image:caption>justinhshex</image:caption><image:title>justinhshex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-1.png</image:loc><image:caption>CybereasonBlogTemplate31</image:caption><image:title>CybereasonBlogTemplate31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-07-28</lastmod></url><url><loc>https://www.cybereason.com/blog/the-malop-severity-score-because-every-second-counts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malop.png</image:loc><image:caption>Malop</image:caption><image:title>Malop</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MalOp%20Severity%20Score.jpg</image:loc><image:caption>MalOpSeverityScore</image:caption><image:title>MalOpSeverityScore</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/andrew-tsui-author.png</image:loc><image:caption>andrewtsuiauthor</image:caption><image:title>andrewtsuiauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(126).png</image:loc><image:caption>blogposttext126</image:caption><image:title>blogposttext126</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-01-14</lastmod></url><url><loc>https://www.cybereason.com/blog/introducing-cybereason-xdr-powered-by-google-chronicle</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(32)-1.png</image:loc><image:caption>CybereasonBlogTemplate321</image:caption><image:title>CybereasonBlogTemplate321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Dec-14-2021-01-34-10-55-PM.png</image:loc><image:caption>image2Dec14202101341055PM</image:caption><image:title>image2Dec14202101341055PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Dec-14-2021-01-34-44-35-PM.png</image:loc><image:caption>image1Dec14202101344435PM</image:caption><image:title>image1Dec14202101344435PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(38)-1.png</image:loc><image:caption>CybereasonBlogTemplate381</image:caption><image:title>CybereasonBlogTemplate381</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(92).png</image:loc><image:caption>blogposttext92</image:caption><image:title>blogposttext92</image:title></image:image><lastmod>2022-03-11</lastmod></url><url><loc>https://www.cybereason.com/resources/leveraging-excel-dde-for-lateral-movement-via-dcom</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Reflection.jpg</image:loc><image:caption>CopyofReflection</image:caption><image:title>CopyofReflection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-04-19</lastmod></url><url><loc>https://www.cybereason.com/blog/the-fbi-vs-gameover-zeus-why-the-dga-based-botnet-wins</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/gameoverzeusscope-1024x391.png</image:loc><image:caption>gameoverzeusscope1024x391</image:caption><image:title>gameoverzeusscope1024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1).png</image:loc><image:caption>BLOGPOST1</image:caption><image:title>BLOGPOST1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Zeus-reconnections-1024x454.png</image:loc><image:caption>Zeusreconnections1024x454</image:caption><image:title>Zeusreconnections1024x454</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-pt-2-featured.png</image:loc><image:caption>cuckoospearpt2featured</image:caption><image:title>cuckoospearpt2featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/gameoverzeus-1024x668.png</image:loc><image:caption>gameoverzeus1024x668</image:caption><image:title>gameoverzeus1024x668</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/resources/decoding-the-power-of-cybereasons-ai-and-15-layers-of-defense</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Decoding-Power-AI-On-Demand.png</image:loc><image:caption>DecodingPowerAIOnDemand</image:caption><image:title>DecodingPowerAIOnDemand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><lastmod>2024-09-20</lastmod></url><url><loc>https://www.cybereason.com/blog/live-feeds-of-150k-surveillance-cameras-compromised-in-verkada-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/how-countries-can-lose-the-internet-ep-213.png</image:loc><image:caption>howcountriescanlosetheinternetep213</image:caption><image:title>howcountriescanlosetheinternetep213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/150K%20Surveillance%20Cameras.png</image:loc><image:caption>150KSurveillanceCameras</image:caption><image:title>150KSurveillanceCameras</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/131%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>131MALICIOUSLIFE</image:caption><image:title>131MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202021-03-11%20at%2019.24.21.png</image:loc><image:caption>Screenshot20210311at192421</image:caption><image:title>Screenshot20210311at192421</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/your-boss-might-tell-you-the-office-is-more-secure-but-it-isnt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechCrunch%20logo-4.png</image:loc><image:caption>TechCrunchlogo4</image:caption><image:title>TechCrunchlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-ciso-israel-barak-to-present-at-black-hat-europe-2016</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-28</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-operation-ghostshell-an-iranian-espionage-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(2).png</image:loc><image:caption>MaliciousLifeepisode2</image:caption><image:title>MaliciousLifeepisode2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/assaf.jpg</image:loc><image:caption>assaf</image:caption><image:title>assaf</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/132%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>132MALICIOUSLIFE1</image:caption><image:title>132MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(4).png</image:loc><image:caption>Maliciouslifepodcast4</image:caption><image:title>Maliciouslifepodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><lastmod>2021-10-18</lastmod></url><url><loc>https://www.cybereason.com/resources/betabot-banking-trojan-neurevt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Perspective_1920x1080.jpg</image:loc><image:caption>Perspective1920x1080</image:caption><image:title>Perspective1920x1080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-09-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/buying-illegal-access-to-enterprise-networks-costs-on-dark-web-skyrocket</loc><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo.png</image:loc><image:caption>SCMagazinelogo</image:caption><image:title>SCMagazinelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-takes-an-operation-centric-approach-to-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Forbes%20logo.png</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-11-16</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/phoenix-keylogger-rises-steals-information</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LightReading%20Security%20Now-1.png</image:loc><image:caption>LightReadingSecurityNow1</image:caption><image:title>LightReadingSecurityNow1</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hamas-linked-hackers-using-sexy-catfish-lures-new-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-3.jpg</image:loc><image:caption>SecurityWeeklogo3</image:caption><image:title>SecurityWeeklogo3</image:title></image:image><lastmod>2022-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/todays-crisis-in-ukraine-highlights-the-security-investment-paradox</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Mar-01-2022-10-53-43-48-PM.png</image:loc><image:caption>SCMagazinelogoMar01202210534348PM</image:caption><image:title>SCMagazinelogoMar01202210534348PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-career-in-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-AllIn-blog.png</image:loc><image:caption>CISOAllInblog</image:caption><image:title>CISOAllInblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mauro%20israel-1.png</image:loc><image:caption>mauroisrael1</image:caption><image:title>mauroisrael1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-09-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-cities-ramp-up-security-in-wake-of-killing-of-irans-top-general</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20News-3.png</image:loc><image:caption>YahooNews3</image:caption><image:title>YahooNews3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-01-14</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-researchers-discover-hacking-operation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-continues-expansion-with-sydney-office</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/ken-westin</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ukraine.png</image:loc><image:caption>ukraine</image:caption><image:title>ukraine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(6).png</image:loc><image:caption>ImagefromiOS6</image:caption><image:title>ImagefromiOS6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ken--2_smaller%20(1).jpg</image:loc><image:caption>Ken2smaller1</image:caption><image:title>Ken2smaller1</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-debuts-the-defenders</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/blog/how-geopolitical-events-will-change-cybersecurity-in-2020</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(1).png</image:loc><image:caption>CISOStoriespodcast1</image:caption><image:title>CISOStoriespodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2020-start-blog.jpg</image:loc><image:caption>2020startblog</image:caption><image:title>2020startblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(6).png</image:loc><image:caption>CISOStoriespodcast6</image:caption><image:title>CISOStoriespodcast6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-12-20</lastmod></url><url><loc>https://www.cybereason.com/blog/saudi-arabia-plant-cyberattack-notpetya</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Oil_Rig_2.jpg</image:loc><image:caption>CopyofOilRig2</image:caption><image:title>CopyofOilRig2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/vs-ransomware.png</image:loc><image:caption>vsransomware</image:caption><image:title>vsransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2018-03-16</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fbi-cisa-warn-china-targeting-orgs-conducting-covid-19-related-vaccine-treatment-research</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-1.png</image:loc><image:caption>SCMagazinelogo1</image:caption><image:title>SCMagazinelogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-what-would-happen-if-cbs-got-hacked</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Would%20Happen%20if%20CBS%20Got%20Hacked.png</image:loc><image:caption>WhatWouldHappenifCBSGotHacked</image:caption><image:title>WhatWouldHappenifCBSGotHacked</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/organizations-more-susceptible-to-ransomware-attacks-during-weekends-and-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Nov-18-2021-02-12-13-44-AM.png</image:loc><image:caption>InfosecurityMagazinelogoNov18202102121344AM</image:caption><image:title>InfosecurityMagazinelogoNov18202102121344AM</image:title></image:image><lastmod>2021-11-18</lastmod></url><url><loc>https://www.cybereason.com/blog/the-security-value-of-exploit-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/exploit-protection-blog-card.png</image:loc><image:caption>exploitprotectionblogcard</image:caption><image:title>exploitprotectionblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/darkgate-featured.png</image:loc><image:caption>darkgatefeatured</image:caption><image:title>darkgatefeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Limor%20Wainstein%20HS.jpg</image:loc><image:caption>LimorWainsteinHS</image:caption><image:title>LimorWainsteinHS</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(6).png</image:loc><image:caption>ThreatAlerttemplate6</image:caption><image:title>ThreatAlerttemplate6</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/conti-ransomware-gang-shuts-operations-following-a-12-million-bounty-on-its-head</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TEISS%20logo-Jun-10-2022-02-26-46-71-AM.png</image:loc><image:caption>TEISSlogoJun10202202264671AM</image:caption><image:title>TEISSlogoJun10202202264671AM</image:title></image:image><lastmod>2022-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-gene-spafford-on-the-morris-worm-cyber-security-in-the-1980s</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/35%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>35MALICIOUSLIFE</image:caption><image:title>35MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-232-Card.png</image:loc><image:caption>MLEp232Card</image:caption><image:title>MLEp232Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Gene%20Spafford.jpeg</image:loc><image:caption>GeneSpafford</image:caption><image:title>GeneSpafford</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-welcomes-congressman-joe-kennedy-iii-to-headquarters</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-wins-bostinno-50-on-fire-award-and-one-of-11-inno-blazers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/careers/sales</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Abbey%20Runner.png</image:loc><image:caption>UbUSpotlightAbbeyRunner</image:caption><image:title>UbUSpotlightAbbeyRunner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/play-btn.png</image:loc><image:caption>playbtn</image:caption><image:title>playbtn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A1484-2.jpg</image:loc><image:caption>D0A14842</image:caption><image:title>D0A14842</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blue_concrete.jpg</image:loc><image:caption>blueconcrete</image:caption><image:title>blueconcrete</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Lior%20Div.jpg</image:loc><image:caption>LiorDiv</image:caption><image:title>LiorDiv</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Danielle%20Wood.png</image:loc><image:caption>UbUSpotlightDanielleWood</image:caption><image:title>UbUSpotlightDanielleWood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/Sales-01.jpg</image:loc><image:caption>Sales01</image:caption><image:title>Sales01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/blog/unpacking-the-gartner-critical-capabilities-research</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-cranford-author.png</image:loc><image:caption>jjcranfordauthor</image:caption><image:title>jjcranfordauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20advances%20prevention%20data%20collection.png</image:loc><image:caption>Cybereasonadvancespreventiondatacollection</image:caption><image:title>Cybereasonadvancespreventiondatacollection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(1).png</image:loc><image:caption>CybereasonBlogTemplate1</image:caption><image:title>CybereasonBlogTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-06-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-selected-as-finalist-for-rsa-conference-contest</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-25</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-security-analytics-the-promise-of-artificial-intelligence-machine-learning-and-data-science</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/security-analytics-blog-banner.jpg</image:loc><image:caption>securityanalyticsblogbanner</image:caption><image:title>securityanalyticsblogbanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/resources/is-xdr-the-next-silver-bullet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/xdr-silver-bullet-card-on-demand.png</image:loc><image:caption>xdrsilverbulletcardondemand</image:caption><image:title>xdrsilverbulletcardondemand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-12-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-python-based-trojan-targets-financial-tech-firms-to-steal-sensitive-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo.png</image:loc><image:caption>TechRepubliclogo</image:caption><image:title>TechRepubliclogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-09-29</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-a-finalist-in-best-endpoint-security-product-category-of-sc-awards-europe-2021</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-05-19</lastmod></url><url><loc>https://www.cybereason.com/resources/mitre-attck-2024-operational-excellence-defined</loc><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE%202024%20CYBEREASON.png</image:loc><image:caption>MITRE2024CYBEREASON</image:caption><image:title>MITRE2024CYBEREASON</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2025-01-22</lastmod></url><url><loc>https://www.cybereason.com/press</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-pagination__next.png</image:loc><image:caption>crpaginationnext</image:caption><image:title>crpaginationnext</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-pagination__prev.png</image:loc><image:caption>crpaginationprev</image:caption><image:title>crpaginationprev</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg-inspektus-wireframe-wing.png</image:loc><image:caption>crbginspektuswireframewing</image:caption><image:title>crbginspektuswireframewing</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-10-26</lastmod></url><url><loc>https://www.cybereason.com/the-defenders-movie</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Facebook_Size_Logo_URL.png</image:loc><image:caption>FacebookSizeLogoURL</image:caption><image:title>FacebookSizeLogoURL</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Defenders%20Movie/The_Defenders_Logo.png</image:loc><image:caption>TheDefendersLogo</image:caption><image:title>TheDefendersLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Defenders%20Movie/Facebook_Size_Logo_URL.png</image:loc><image:caption>FacebookSizeLogoURL</image:caption><image:title>FacebookSizeLogoURL</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-is-ransomfree-tips-to-protect-against-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/WTOP-800x720.jpg</image:loc><image:caption>WTOP800x720</image:caption><image:title>WTOP800x720</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-nocturnus-researchers-discover-a-new-cyber-threat-against-uk-and-european-union-financial-technology-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-raises-275-million-in-series-f-funding-round-with-liberty-strategic-capital-leading-round</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20News%20logo-2.png</image:loc><image:caption>YahooNewslogo2</image:caption><image:title>YahooNewslogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-07-15</lastmod></url><url><loc>https://www.cybereason.com/fundamentals/what-is-epp</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/101-what-is-epp-featured.png</image:loc><image:caption>101whatiseppfeatured</image:caption><image:title>101whatiseppfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/dark-metal-background.png</image:loc><image:caption>darkmetalbackground</image:caption><image:title>darkmetalbackground</image:title></image:image><lastmod>2023-05-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-ciso-israel-barak-on-earning-cyber-security-gold-at-the-summer-olympics</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(107).png</image:loc><image:caption>blogposttext107</image:caption><image:title>blogposttext107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_358369124-1000x391.jpg</image:loc><image:caption>shutterstock3583691241000x391</image:caption><image:title>shutterstock3583691241000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CybereasonBlogHeroTemplate</image:caption><image:title>CybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/how-xdr-can-play-a-key-role-in-achieving-zero-trust</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T141451.987.png</image:loc><image:caption>blogposttext20220725T141451987</image:caption><image:title>blogposttext20220725T141451987</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><lastmod>2022-07-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-pounce-on-honeypot-gateway-to-a-power-station</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-8.png</image:loc><image:caption>SCMagazine8</image:caption><image:title>SCMagazine8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2019-02-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-five-most-common-cyberattack-myths-revealed</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-to-select-the-right-products-for-your-product-portfolio-can-be-challenging</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fed-provide-legal-loophole-to-hacking-iot-devices</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Untitled-design-16.png</image:loc><image:caption>Untitleddesign16</image:caption><image:title>Untitleddesign16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/yahoo-3-billion-accounts-breached-in-2013.-yes-3-billion-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Associated_Press_logo.png</image:loc><image:caption>AssociatedPresslogo</image:caption><image:title>AssociatedPresslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/royal-ransomware-analysis</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%2016.png</image:loc><image:caption>RoyalRansomwareImage16</image:caption><image:title>RoyalRansomwareImage16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%202.png</image:loc><image:caption>RoyalRansomwareImage2</image:caption><image:title>RoyalRansomwareImage2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%2011.png</image:loc><image:caption>RoyalRansomwareImage11</image:caption><image:title>RoyalRansomwareImage11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%206.png</image:loc><image:caption>RoyalRansomwareImage6</image:caption><image:title>RoyalRansomwareImage6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-inc-ransomware-featured-image.png</image:loc><image:caption>threatalertincransomwarefeaturedimage</image:caption><image:title>threatalertincransomwarefeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%208.png</image:loc><image:caption>RoyalRansomwareImage8</image:caption><image:title>RoyalRansomwareImage8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%207.png</image:loc><image:caption>RoyalRansomwareImage7</image:caption><image:title>RoyalRansomwareImage7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%2012.png</image:loc><image:caption>RoyalRansomwareImage12</image:caption><image:title>RoyalRansomwareImage12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%203.png</image:loc><image:caption>RoyalRansomwareImage3</image:caption><image:title>RoyalRansomwareImage3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%2017.png</image:loc><image:caption>RoyalRansomwareImage17</image:caption><image:title>RoyalRansomwareImage17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%2010.png</image:loc><image:caption>RoyalRansomwareImage10</image:caption><image:title>RoyalRansomwareImage10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%2020.png</image:loc><image:caption>RoyalRansomwareImage20</image:caption><image:title>RoyalRansomwareImage20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%2015.png</image:loc><image:caption>RoyalRansomwareImage15</image:caption><image:title>RoyalRansomwareImage15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%2021.png</image:loc><image:caption>RoyalRansomwareImage21</image:caption><image:title>RoyalRansomwareImage21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%2019.png</image:loc><image:caption>RoyalRansomwareImage19</image:caption><image:title>RoyalRansomwareImage19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%209.png</image:loc><image:caption>RoyalRansomwareImage9</image:caption><image:title>RoyalRansomwareImage9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Alon%20Laufer.jpg</image:loc><image:caption>AlonLaufer</image:caption><image:title>AlonLaufer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T093119.758.png</image:loc><image:caption>blogposttext20220830T093119758</image:caption><image:title>blogposttext20220830T093119758</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%205.png</image:loc><image:caption>RoyalRansomwareImage5</image:caption><image:title>RoyalRansomwareImage5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Royal%20Ransomware-1.png</image:loc><image:caption>RoyalRansomware1</image:caption><image:title>RoyalRansomware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Eli%20Salem.png</image:loc><image:caption>EliSalem</image:caption><image:title>EliSalem</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%2013.png</image:loc><image:caption>RoyalRansomwareImage13</image:caption><image:title>RoyalRansomwareImage13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%2018.png</image:loc><image:caption>RoyalRansomwareImage18</image:caption><image:title>RoyalRansomwareImage18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%204.png</image:loc><image:caption>RoyalRansomwareImage4</image:caption><image:title>RoyalRansomwareImage4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Mark%20Tsipershtein.png</image:loc><image:caption>MarkTsipershtein</image:caption><image:title>MarkTsipershtein</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20Royal%20Ransomware/Royal%20Ransomware%20Image%2014.png</image:loc><image:caption>RoyalRansomwareImage14</image:caption><image:title>RoyalRansomwareImage14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Royal%20Ransomware%20Image%201.png</image:loc><image:caption>RoyalRansomwareImage1</image:caption><image:title>RoyalRansomwareImage1</image:title></image:image><lastmod>2022-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/mac-os-x-ransomware-shows-security-matters-to-macs-too</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/macosx_ransomware.jpg</image:loc><image:caption>macosxransomware</image:caption><image:title>macosxransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AmitSerper2017.png</image:loc><image:caption>AmitSerper2017</image:caption><image:title>AmitSerper2017</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(2).png</image:loc><image:caption>ImagefromiOS2</image:caption><image:title>ImagefromiOS2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/research/hunting-raccoon-stealer-the-new-masked-bandit-on-the-block</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-19.png</image:loc><image:caption>RaccoonBlog19</image:caption><image:title>RaccoonBlog19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-134.png</image:loc><image:caption>image134</image:caption><image:title>image134</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-24.png</image:loc><image:caption>RaccoonBlog24</image:caption><image:title>RaccoonBlog24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-3.png</image:loc><image:caption>RaccoonBlog3</image:caption><image:title>RaccoonBlog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-16.png</image:loc><image:caption>RaccoonBlog16</image:caption><image:title>RaccoonBlog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-14.png</image:loc><image:caption>RaccoonBlog14</image:caption><image:title>RaccoonBlog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-25.png</image:loc><image:caption>RaccoonBlog25</image:caption><image:title>RaccoonBlog25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-2.png</image:loc><image:caption>RaccoonBlog2</image:caption><image:title>RaccoonBlog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-6.png</image:loc><image:caption>RaccoonBlog6</image:caption><image:title>RaccoonBlog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-20.png</image:loc><image:caption>RaccoonBlog20</image:caption><image:title>RaccoonBlog20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-5.png</image:loc><image:caption>RaccoonBlog5</image:caption><image:title>RaccoonBlog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-10.png</image:loc><image:caption>RaccoonBlog10</image:caption><image:title>RaccoonBlog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-1.png</image:loc><image:caption>RaccoonBlog1</image:caption><image:title>RaccoonBlog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog.png</image:loc><image:caption>RaccoonBlog</image:caption><image:title>RaccoonBlog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-9.png</image:loc><image:caption>RaccoonBlog9</image:caption><image:title>RaccoonBlog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-21.png</image:loc><image:caption>RaccoonBlog21</image:caption><image:title>RaccoonBlog21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-136.png</image:loc><image:caption>image136</image:caption><image:title>image136</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-31.png</image:loc><image:caption>RaccoonBlog31</image:caption><image:title>RaccoonBlog31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-22.png</image:loc><image:caption>RaccoonBlog22</image:caption><image:title>RaccoonBlog22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-135.png</image:loc><image:caption>image135</image:caption><image:title>image135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-23.png</image:loc><image:caption>RaccoonBlog23</image:caption><image:title>RaccoonBlog23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-15.png</image:loc><image:caption>RaccoonBlog15</image:caption><image:title>RaccoonBlog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-12.png</image:loc><image:caption>RaccoonBlog12</image:caption><image:title>RaccoonBlog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-137.png</image:loc><image:caption>image137</image:caption><image:title>image137</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-13.png</image:loc><image:caption>RaccoonBlog13</image:caption><image:title>RaccoonBlog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-7.png</image:loc><image:caption>RaccoonBlog7</image:caption><image:title>RaccoonBlog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-17.png</image:loc><image:caption>RaccoonBlog17</image:caption><image:title>RaccoonBlog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-4.png</image:loc><image:caption>RaccoonBlog4</image:caption><image:title>RaccoonBlog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-18.png</image:loc><image:caption>RaccoonBlog18</image:caption><image:title>RaccoonBlog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Raccoon%20Blog-11.png</image:loc><image:caption>RaccoonBlog11</image:caption><image:title>RaccoonBlog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-thamar-reservoir</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-thamar-reservoir.png</image:loc><image:caption>MaliciousLifeepisodethamarreservoir</image:caption><image:title>MaliciousLifeepisodethamarreservoir</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-support-for-the-u.k.-cybersecurity-strategy-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8994.jpg</image:loc><image:caption>IMG8994</image:caption><image:title>IMG8994</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(74).png</image:loc><image:caption>blogposttext74</image:caption><image:title>blogposttext74</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UK-government-cyber-strategy.jpg</image:loc><image:caption>UKgovernmentcyberstrategy</image:caption><image:title>UKgovernmentcyberstrategy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-1.png</image:loc><image:caption>blogposttext1</image:caption><image:title>blogposttext1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(64).png</image:loc><image:caption>blogposttext64</image:caption><image:title>blogposttext64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-03-24</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-a-new-season-of-the-award-winning-malicious-life</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/resources/the-right-roles-for-siem-and-edr-webinar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/City%20Top%20View_v2.png</image:loc><image:caption>CityTopViewv2</image:caption><image:title>CityTopViewv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-05-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-life-and-exploits-of-albert-gonzales-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RSA%20BREACH%20P2%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>RSABREACHP2MALICIOUSLIFE</image:caption><image:title>RSABREACHP2MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(5)-1.png</image:loc><image:caption>pastedimage051</image:caption><image:title>pastedimage051</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><lastmod>2023-04-04</lastmod></url><url><loc>https://www.cybereason.com/blog/think-small-when-it-comes-to-the-footprint-of-an-endpoint-security-product</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/post_header.png</image:loc><image:caption>postheader</image:caption><image:title>postheader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CopyofCybereasonBlogHeroTemplate1</image:caption><image:title>CopyofCybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FIN7_BadUSB.png</image:loc><image:caption>FIN7BadUSB</image:caption><image:title>FIN7BadUSB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-deep-hunting-tour-stops-in-50-cities-across-the-united-states</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-hosts-ciso-roundtable-cisos-face-perfect-storm-of-ransomware-and-state-supported-cybercrime</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Register%20logo-1.png</image:loc><image:caption>TheRegisterlogo1</image:caption><image:title>TheRegisterlogo1</image:title></image:image><lastmod>2022-04-03</lastmod></url><url><loc>https://www.cybereason.com/blog/olympic-destroyer-winter-games-cyberattack-south-korea</loc><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason-Logo-no-text-dark-gray-128x128.png</image:loc><image:caption>CybereasonLogonotextdarkgray128x128</image:caption><image:title>CybereasonLogonotextdarkgray128x128</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_328195181.jpg</image:loc><image:caption>shutterstock328195181</image:caption><image:title>shutterstock328195181</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-02-13</lastmod></url><url><loc>https://www.cybereason.com/blog/how-xdr-is-changing-security-for-the-better</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(31).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews31</image:caption><image:title>CopyofBLOGSOCIALSETNews31</image:title></image:image><lastmod>2022-02-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-government-identifies-north-korean-hacking-tool</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Silicon.co-1.jpg</image:loc><image:caption>Siliconco1</image:caption><image:title>Siliconco1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/apple-flaw-allows-macos-high-sierra-logins-without-passwords</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CNET.png</image:loc><image:caption>CNET</image:caption><image:title>CNET</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/nextgen-distribution-signs-a/nz-deal-with-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/arn-idg.png</image:loc><image:caption>arnidg</image:caption><image:title>arnidg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-02-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/apple-users-urged-to-install-latest-updates-to-combat-hacking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo-Aug-23-2022-11-57-11-12-PM.png</image:loc><image:caption>TechRepubliclogoAug23202211571112PM</image:caption><image:title>TechRepubliclogoAug23202211571112PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-08-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/dells-belated-data-breach-notification-angers-cybersecurity-industry-execs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-5.png</image:loc><image:caption>SCMagazine5</image:caption><image:title>SCMagazine5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-12-03</lastmod></url><url><loc>https://www.cybereason.com/blog/rhadamanthys-stealer-europe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image30.png</image:loc><image:caption>image30</image:caption><image:title>image30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image24.png</image:loc><image:caption>image24</image:caption><image:title>image24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image19.png</image:loc><image:caption>image19</image:caption><image:title>image19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image7.png</image:loc><image:caption>image7</image:caption><image:title>image7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image5.png</image:loc><image:caption>image5</image:caption><image:title>image5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image31.png</image:loc><image:caption>image31</image:caption><image:title>image31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image9.png</image:loc><image:caption>image9</image:caption><image:title>image9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image27.png</image:loc><image:caption>image27</image:caption><image:title>image27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image10.png</image:loc><image:caption>image10</image:caption><image:title>image10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image15.png</image:loc><image:caption>image15</image:caption><image:title>image15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image28.png</image:loc><image:caption>image28</image:caption><image:title>image28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image22.png</image:loc><image:caption>image22</image:caption><image:title>image22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image11.png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image1.png</image:loc><image:caption>image1</image:caption><image:title>image1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image6.png</image:loc><image:caption>image6</image:caption><image:title>image6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image23.png</image:loc><image:caption>image23</image:caption><image:title>image23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image18.png</image:loc><image:caption>image18</image:caption><image:title>image18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image14.png</image:loc><image:caption>image14</image:caption><image:title>image14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image21.png</image:loc><image:caption>image21</image:caption><image:title>image21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image16.png</image:loc><image:caption>image16</image:caption><image:title>image16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image25.jpg</image:loc><image:caption>image25</image:caption><image:title>image25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image13.png</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20-%20Rhadamanthys%20-%20May%202025/image2.png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(18).png</image:loc><image:caption>BLOGImagesTemplatev218</image:caption><image:title>BLOGImagesTemplatev218</image:title></image:image><lastmod>2025-05-28</lastmod></url><url><loc>https://www.cybereason.com/blog/the-energetic-bear-apt-group</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-4.png</image:loc><image:caption>image94</image:caption><image:title>image94</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(60).png</image:loc><image:caption>blogposttext60</image:caption><image:title>blogposttext60</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-07-10</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-sony-bmgs-rootkit-fiasco</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(3)-2.png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-242-Card.png</image:loc><image:caption>MLEp242Card</image:caption><image:title>MLEp242Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/sony-bmg-rootkit-ep-218.png</image:loc><image:caption>sonybmgrootkitep218</image:caption><image:title>sonybmgrootkitep218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-attacks-are-a-fact-of-life-so-real-time-detection-response-is-critical</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/ThirdCertainty.png</image:loc><image:caption>ThirdCertainty</image:caption><image:title>ThirdCertainty</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-fight-against-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITWeb%20logo.png</image:loc><image:caption>ITWeblogo</image:caption><image:title>ITWeblogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-09-22</lastmod></url><url><loc>https://www.cybereason.com/blog/research/a-bazar-of-tricks-following-team9s-development-cycles</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-6.png</image:loc><image:caption>Bazar6</image:caption><image:title>Bazar6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-26.png</image:loc><image:caption>Bazar26</image:caption><image:title>Bazar26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-48.png</image:loc><image:caption>Bazar48</image:caption><image:title>Bazar48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-22.png</image:loc><image:caption>Bazar22</image:caption><image:title>Bazar22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-47.png</image:loc><image:caption>Bazar47</image:caption><image:title>Bazar47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-45.png</image:loc><image:caption>Bazar45</image:caption><image:title>Bazar45</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-8.png</image:loc><image:caption>Bazar8</image:caption><image:title>Bazar8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-44.png</image:loc><image:caption>Bazar44</image:caption><image:title>Bazar44</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-42.png</image:loc><image:caption>Bazar42</image:caption><image:title>Bazar42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-40.png</image:loc><image:caption>Bazar40</image:caption><image:title>Bazar40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-35.png</image:loc><image:caption>Bazar35</image:caption><image:title>Bazar35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-14.png</image:loc><image:caption>Bazar14</image:caption><image:title>Bazar14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-29.png</image:loc><image:caption>Bazar29</image:caption><image:title>Bazar29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-49.png</image:loc><image:caption>Bazar49</image:caption><image:title>Bazar49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-11.png</image:loc><image:caption>Bazar11</image:caption><image:title>Bazar11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bazar-gif-final.gif</image:loc><image:caption>bazargiffinal</image:caption><image:title>bazargiffinal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-17.png</image:loc><image:caption>Bazar17</image:caption><image:title>Bazar17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-5.png</image:loc><image:caption>Bazar5</image:caption><image:title>Bazar5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-19.png</image:loc><image:caption>Bazar19</image:caption><image:title>Bazar19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-36.png</image:loc><image:caption>Bazar36</image:caption><image:title>Bazar36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-21.png</image:loc><image:caption>Bazar21</image:caption><image:title>Bazar21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-32.png</image:loc><image:caption>Bazar32</image:caption><image:title>Bazar32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-34.png</image:loc><image:caption>Bazar34</image:caption><image:title>Bazar34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-37.png</image:loc><image:caption>Bazar37</image:caption><image:title>Bazar37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-30.png</image:loc><image:caption>Bazar30</image:caption><image:title>Bazar30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-2.png</image:loc><image:caption>Bazar2</image:caption><image:title>Bazar2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-43.png</image:loc><image:caption>Bazar43</image:caption><image:title>Bazar43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-46.png</image:loc><image:caption>Bazar46</image:caption><image:title>Bazar46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-9.png</image:loc><image:caption>Bazar9</image:caption><image:title>Bazar9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-20.png</image:loc><image:caption>Bazar20</image:caption><image:title>Bazar20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-13.png</image:loc><image:caption>Bazar13</image:caption><image:title>Bazar13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-15.png</image:loc><image:caption>Bazar15</image:caption><image:title>Bazar15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-23.png</image:loc><image:caption>Bazar23</image:caption><image:title>Bazar23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-4.png</image:loc><image:caption>Bazar4</image:caption><image:title>Bazar4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-33.png</image:loc><image:caption>Bazar33</image:caption><image:title>Bazar33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-18.png</image:loc><image:caption>Bazar18</image:caption><image:title>Bazar18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-7.png</image:loc><image:caption>Bazar7</image:caption><image:title>Bazar7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-25.png</image:loc><image:caption>Bazar25</image:caption><image:title>Bazar25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-31.png</image:loc><image:caption>Bazar31</image:caption><image:title>Bazar31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bazar-of-tricks-blog-image.png</image:loc><image:caption>bazaroftricksblogimage</image:caption><image:title>bazaroftricksblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-3.png</image:loc><image:caption>Bazar3</image:caption><image:title>Bazar3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-24.png</image:loc><image:caption>Bazar24</image:caption><image:title>Bazar24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-10.png</image:loc><image:caption>Bazar10</image:caption><image:title>Bazar10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-12.png</image:loc><image:caption>Bazar12</image:caption><image:title>Bazar12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-41.png</image:loc><image:caption>Bazar41</image:caption><image:title>Bazar41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-39.png</image:loc><image:caption>Bazar39</image:caption><image:title>Bazar39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-28.png</image:loc><image:caption>Bazar28</image:caption><image:title>Bazar28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-27.png</image:loc><image:caption>Bazar27</image:caption><image:title>Bazar27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bazar-38.png</image:loc><image:caption>Bazar38</image:caption><image:title>Bazar38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bazar-blog-new-screenshot.png</image:loc><image:caption>bazarblognewscreenshot</image:caption><image:title>bazarblognewscreenshot</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/how-endpoint-detection-and-response-platforms-differ-from-ngav</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_67176910.jpg</image:loc><image:caption>shutterstock67176910</image:caption><image:title>shutterstock67176910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-11-10</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-wandera-partner-to-empower-customers-in-detecting-cross-platform-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-05-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/enterprise-organizations-are-taking-steps-to-improve-cybersecurity-analytics</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/network_world.jpg</image:loc><image:caption>networkworld</image:caption><image:title>networkworld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-october-13th-2022-ten-considerations-for-more-efficient-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(30).png</image:loc><image:caption>CybereasonBlogTemplate30</image:caption><image:title>CybereasonBlogTemplate30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-circle-headshot.png</image:loc><image:caption>jjcircleheadshot</image:caption><image:title>jjcircleheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Gregg-Robbins-Watco-Circle.png</image:loc><image:caption>GreggRobbinsWatcoCircle</image:caption><image:title>GreggRobbinsWatcoCircle</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-29T075130.403.png</image:loc><image:caption>blogposttext20220929T075130403</image:caption><image:title>blogposttext20220929T075130403</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(7).png</image:loc><image:caption>CybereasonBlogTemplate7</image:caption><image:title>CybereasonBlogTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-09-29</lastmod></url><url><loc>https://www.cybereason.com/resources/the-ghost-in-the-machine-reconciling-ai-and-trust-in-the-connected-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ghost-Machine-Banner-Resources.png</image:loc><image:caption>GhostMachineBannerResources</image:caption><image:title>GhostMachineBannerResources</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2020-08-04</lastmod></url><url><loc>https://www.cybereason.com/blog/how-to-prevent-out-of-memory-in-java-based-kubernetes-pods</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Mar-14-2022-08-33-21-81-PM.png</image:loc><image:caption>image2Mar14202208332181PM</image:caption><image:title>image2Mar14202208332181PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_20220315_152446.jpg</image:loc><image:caption>IMG20220315152446</image:caption><image:title>IMG20220315152446</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Mar-14-2022-08-32-51-88-PM.png</image:loc><image:caption>image1Mar14202208325188PM</image:caption><image:title>image1Mar14202208325188PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(44).png</image:loc><image:caption>blogposttext44</image:caption><image:title>blogposttext44</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-pt-2-featured.png</image:loc><image:caption>cuckoospearpt2featured</image:caption><image:title>cuckoospearpt2featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2023-04-10</lastmod></url><url><loc>https://www.cybereason.com/blog/ttp-briefing-jan-may-2025</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/TTP%20Briefing%20Jan-May%20-%20sectors%20.png</image:loc><image:caption>TTPBriefingJanMaysectors</image:caption><image:title>TTPBriefingJanMaysectors</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/TTP%20Briefing%20Jan-May%20-%20Incident%20Type1.png</image:loc><image:caption>TTPBriefingJanMayIncidentType1</image:caption><image:title>TTPBriefingJanMayIncidentType1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/Intrusion%20Path.png</image:loc><image:caption>IntrusionPath</image:caption><image:title>IntrusionPath</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/TTP%20Briefing%20Jan-May%20-%20MFA%20.png</image:loc><image:caption>TTPBriefingJanMayMFA</image:caption><image:title>TTPBriefingJanMayMFA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(122).png</image:loc><image:caption>blogposttext122</image:caption><image:title>blogposttext122</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(126).png</image:loc><image:caption>blogposttext126</image:caption><image:title>blogposttext126</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/TTP%20Briefing%20Jan-May%20-%20IIV.png</image:loc><image:caption>TTPBriefingJanMayIIV</image:caption><image:title>TTPBriefingJanMayIIV</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/dwelltimefinal2.png</image:loc><image:caption>dwelltimefinal2</image:caption><image:title>dwelltimefinal2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2025-07-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/premier-foods-defends-itself-against-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/food_manufacture_logo.png</image:loc><image:caption>foodmanufacturelogo</image:caption><image:title>foodmanufacturelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2019-01-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-cybereason-ransomware-study-reveals-true-cost-to-uae-businesses</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CXO%20DX%20logo.jpg</image:loc><image:caption>CXODXlogo</image:caption><image:title>CXODXlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-06-18</lastmod></url><url><loc>https://www.cybereason.com/resources/.net-malware-dropper</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-featured-image.png</image:loc><image:caption>crfeaturedimage</image:caption><image:title>crfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-07-19</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-die-a-new-paradigm-for-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(3).png</image:loc><image:caption>Maliciouslifepodcast3</image:caption><image:title>Maliciouslifepodcast3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Souni_Yu.jpg</image:loc><image:caption>SouniYu</image:caption><image:title>SouniYu</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-241-Card.png</image:loc><image:caption>MLEp241Card</image:caption><image:title>MLEp241Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(2).png</image:loc><image:caption>MaliciousLifeepisode2</image:caption><image:title>MaliciousLifeepisode2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-03-28</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-launches-operations-in-spain</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-u.s.-report-on-democratic-hacking-was-wake-up-call-for-improved-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Untitled-design-14.png</image:loc><image:caption>Untitleddesign14</image:caption><image:title>Untitleddesign14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hamas-linked-hackers-exploit-current-events-to-spy-on-rival-palestinian-officials-researchers-say</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cyberscoop%20logo-3.png</image:loc><image:caption>cyberscooplogo3</image:caption><image:title>cyberscooplogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-02-13</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-in-the-news-the-minds-behind-osxpirrit-the-malicious-mac-adware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_326987396-1000x391.jpg</image:loc><image:caption>shutterstock3269873961000x391</image:caption><image:title>shutterstock3269873961000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malop.png</image:loc><image:caption>Malop</image:caption><image:title>Malop</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-introduces-new-pay-as-you-grow-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Tahawul%20Tech%20logo-2.jpg</image:loc><image:caption>TahawulTechlogo2</image:caption><image:title>TahawulTechlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-march-9th-2022-protecting-containers-at-runtime-with-cybereason-xdr-for-cloud-workloads</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/yonatan-cropped-hexagon.png</image:loc><image:caption>yonatancroppedhexagon</image:caption><image:title>yonatancroppedhexagon</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(8).png</image:loc><image:caption>blogposttext8</image:caption><image:title>blogposttext8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR_XDR.png</image:loc><image:caption>EDRXDR</image:caption><image:title>EDRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cody-queen.png</image:loc><image:caption>codyqueen</image:caption><image:title>codyqueen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><lastmod>2022-02-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-chris-roberts-hackers-on-a-plane</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(29).png</image:loc><image:caption>MaliciousLifeepisode29</image:caption><image:title>MaliciousLifeepisode29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(3)-1.png</image:loc><image:caption>MaliciousLifeepisode31</image:caption><image:title>MaliciousLifeepisode31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jailbreaking%20Tractors-1.png</image:loc><image:caption>JailbreakingTractors1</image:caption><image:title>JailbreakingTractors1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><lastmod>2022-04-10</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/cybereason-global-soc-team</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CopyofCybereasonBlogHeroTemplate1</image:caption><image:title>CopyofCybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T090944.782.png</image:loc><image:caption>blogposttext20220907T090944782</image:caption><image:title>blogposttext20220907T090944782</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(4).png</image:loc><image:caption>CopyofThreatAlertAnalysis4</image:caption><image:title>CopyofThreatAlertAnalysis4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSI%20Masquerading%20as%20a%20Malicious%20Software%20Installer%20blog.png</image:loc><image:caption>MSIMasqueradingasaMaliciousSoftwareInstallerblog</image:caption><image:title>MSIMasqueradingasaMaliciousSoftwareInstallerblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis.png</image:loc><image:caption>CopyofThreatAlertAnalysis</image:caption><image:title>CopyofThreatAlertAnalysis</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Black%20Basta%20Threat%20Alert.png</image:loc><image:caption>BlackBastaThreatAlert</image:caption><image:title>BlackBastaThreatAlert</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(33).png</image:loc><image:caption>blogposttext33</image:caption><image:title>blogposttext33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T113003.246.png</image:loc><image:caption>blogposttext20221003T113003246</image:caption><image:title>blogposttext20221003T113003246</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template.png</image:loc><image:caption>ThreatAlerttemplate</image:caption><image:title>ThreatAlerttemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(84).png</image:loc><image:caption>blogposttext84</image:caption><image:title>blogposttext84</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T093119.758.png</image:loc><image:caption>blogposttext20220830T093119758</image:caption><image:title>blogposttext20220830T093119758</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(5).png</image:loc><image:caption>ThreatAlerttemplate5</image:caption><image:title>ThreatAlerttemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cloud-detection-sysdig-featured-image.png</image:loc><image:caption>clouddetectionsysdigfeaturedimage</image:caption><image:title>clouddetectionsysdigfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(1).png</image:loc><image:caption>CopyofThreatAlertAnalysis1</image:caption><image:title>CopyofThreatAlertAnalysis1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(125).png</image:loc><image:caption>blogposttext125</image:caption><image:title>blogposttext125</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(47).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews47</image:caption><image:title>CopyofBLOGSOCIALSETNews47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(2).png</image:loc><image:caption>CopyofThreatAlertAnalysis2</image:caption><image:title>CopyofThreatAlertAnalysis2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lockbit-3-blog-card.png</image:loc><image:caption>lockbit3blogcard</image:caption><image:title>lockbit3blogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(1).png</image:loc><image:caption>ThreatAlerttemplate1</image:caption><image:title>ThreatAlerttemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T071524.894.png</image:loc><image:caption>blogposttext20220707T071524894</image:caption><image:title>blogposttext20220707T071524894</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(124).png</image:loc><image:caption>blogposttext124</image:caption><image:title>blogposttext124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(5).png</image:loc><image:caption>CopyofThreatAlertAnalysis5</image:caption><image:title>CopyofThreatAlertAnalysis5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(2).png</image:loc><image:caption>ImagefromiOS2</image:caption><image:title>ImagefromiOS2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-21T133543.854.png</image:loc><image:caption>blogposttext20220621T133543854</image:caption><image:title>blogposttext20220621T133543854</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T115923.524.png</image:loc><image:caption>blogposttext20220815T115923524</image:caption><image:title>blogposttext20220815T115923524</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T103718.231.png</image:loc><image:caption>blogposttext20220914T103718231</image:caption><image:title>blogposttext20220914T103718231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(3).png</image:loc><image:caption>CopyofThreatAlertAnalysis3</image:caption><image:title>CopyofThreatAlertAnalysis3</image:title></image:image><lastmod>2024-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-taking-shortcuts-using-lnk-files-for-initial-infection-and-persistence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/threat-analysis-lnk-files-featured-image.png</image:loc><image:caption>threatanalysislnkfilesfeaturedimage</image:caption><image:title>threatanalysislnkfilesfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/taking-shortcuts-blog-3.png</image:loc><image:caption>takingshortcutsblog3</image:caption><image:title>takingshortcutsblog3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/taking-shortcuts-blog-2.png</image:loc><image:caption>takingshortcutsblog2</image:caption><image:title>takingshortcutsblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/taking-shortcuts-blog-1.png</image:loc><image:caption>takingshortcutsblog1</image:caption><image:title>takingshortcutsblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/taking-shortcuts-blog-5.png</image:loc><image:caption>takingshortcutsblog5</image:caption><image:title>takingshortcutsblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(18).png</image:loc><image:caption>CybereasonBlogTemplate18</image:caption><image:title>CybereasonBlogTemplate18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-derrick.jpg</image:loc><image:caption>DLLSideLoadingderrick</image:caption><image:title>DLLSideLoadingderrick</image:title></image:image><lastmod>2024-01-19</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cybereason-ciso-interview-series-robert-bigman-former-cia-ciso-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(9).png</image:loc><image:caption>CISOStoriestemplate9</image:caption><image:title>CISOStoriestemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_607834274.jpg</image:loc><image:caption>shutterstock607834274</image:caption><image:title>shutterstock607834274</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-03-26</lastmod></url><url><loc>https://www.cybereason.com/blog/ensuring-data-privacy-update-on-eu-court-of-justice-ruling-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(2).png</image:loc><image:caption>CISOStoriespodcast2</image:caption><image:title>CISOStoriespodcast2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EU-Flag-Privacy-Shield-Blog.png</image:loc><image:caption>EUFlagPrivacyShieldBlog</image:caption><image:title>EUFlagPrivacyShieldBlog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(10)-1.png</image:loc><image:caption>CISOStoriestemplate101</image:caption><image:title>CISOStoriestemplate101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/startup-cybereason-raises-100m-from-softbank</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Nikkei_Asian_Review.jpg</image:loc><image:caption>NikkeiAsianReview</image:caption><image:title>NikkeiAsianReview</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/terms/services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><lastmod>2025-07-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyber-madness-photos-takeaways-honeypots-espionage-plots-more</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Xconomy%20logo-1.png</image:loc><image:caption>Xconomylogo1</image:caption><image:title>Xconomylogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2019-04-26</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-other-problem-with-nfts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/nfts-disappear-mlbside-ep-207.png</image:loc><image:caption>nftsdisappearmlbsideep207</image:caption><image:title>nftsdisappearmlbsideep207</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(30).png</image:loc><image:caption>MaliciousLifeepisode30</image:caption><image:title>MaliciousLifeepisode30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/other-problem-with-nfts-ep-206.png</image:loc><image:caption>otherproblemwithnftsep206</image:caption><image:title>otherproblemwithnftsep206</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/oded_vanuvu.jpg</image:loc><image:caption>odedvanuvu</image:caption><image:title>odedvanuvu</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2023-08-29</lastmod></url><url><loc>https://www.cybereason.com/blog/as-signature-detection-wanes-behavior-analysis-takes-over</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(104).png</image:loc><image:caption>blogposttext104</image:caption><image:title>blogposttext104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Blog_Post-Header_Malware-1.png</image:loc><image:caption>BlogPostHeaderMalware1</image:caption><image:title>BlogPostHeaderMalware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/ensuring-digital-safety-and-security-this-holiday-season</loc><image:image><image:loc>https://www.cybereason.com/hubfs/holiday-sale-blog-a.png</image:loc><image:caption>holidaysalebloga</image:caption><image:title>holidaysalebloga</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T115923.524.png</image:loc><image:caption>blogposttext20220815T115923524</image:caption><image:title>blogposttext20220815T115923524</image:title></image:image><lastmod>2020-12-02</lastmod></url><url><loc>https://www.cybereason.com/blog/case-study-scm-insurance-services-finds-true-partnership-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Spotlight%20posts%20(1).png</image:loc><image:caption>Spotlightposts1</image:caption><image:title>Spotlightposts1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/scm-insurance-services-case-study.png</image:loc><image:caption>scminsuranceservicescasestudy</image:caption><image:title>scminsuranceservicescasestudy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-10-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/voting-process-under-spotlight-after-iowa-confusion</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wall-street-journal-logo-3.png</image:loc><image:caption>wallstreetjournallogo3</image:caption><image:title>wallstreetjournallogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-02-11</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-to-cnbc-2022-disruptor-50-list</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-developing-secure-agile-code-quickly-is-very-achievable</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Glenn%20Kapetansky.png</image:loc><image:caption>GlennKapetansky</image:caption><image:title>GlennKapetansky</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(1).png</image:loc><image:caption>CISOStoriestemplate1</image:caption><image:title>CISOStoriestemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/combat-ransomware-with-behavioral-analysis</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/behind-closed-doors-rise-of-remote-access-featured.png</image:loc><image:caption>behindcloseddoorsriseofremoteaccessfeatured</image:caption><image:title>behindcloseddoorsriseofremoteaccessfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/hardbit-threat-analysis-featured.png</image:loc><image:caption>hardbitthreatanalysisfeatured</image:caption><image:title>hardbitthreatanalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/ransomware-timeline-1024x580.png</image:loc><image:caption>ransomwaretimeline1024x580</image:caption><image:title>ransomwaretimeline1024x580</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_256556548-1024x391.jpg</image:loc><image:caption>shutterstock2565565481024x391</image:caption><image:title>shutterstock2565565481024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2018-02-09</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-warns-global-critical-infrastructure-operators-after-attacks-from-ragnar-locker-ransomware-gang</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-09-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/9-steps-for-a-successful-incident-response-plan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CSO.png</image:loc><image:caption>CSO</image:caption><image:title>CSO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/platform/threat-hunting</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/BUSINESS_PROCESS_CR_ICONS_BATCH_2_MONO-19.svg</image:loc><image:caption>BUSINESSPROCESSCRICONSBATCH2MONO19</image:caption><image:title>BUSINESSPROCESSCRICONSBATCH2MONO19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/Cybereason%20Build%20A%20Query%20Screen.png</image:loc><image:caption>CybereasonBuildAQueryScreen</image:caption><image:title>CybereasonBuildAQueryScreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/Cybereason%20Platform%20Investigation%20Screen.png</image:loc><image:caption>CybereasonPlatformInvestigationScreen</image:caption><image:title>CybereasonPlatformInvestigationScreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/CR_ICONS_MONO-20.svg</image:loc><image:caption>CRICONSMONO20</image:caption><image:title>CRICONSMONO20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISION_CR_ICONS_MONO-39.svg</image:loc><image:caption>VISIONCRICONSMONO39</image:caption><image:title>VISIONCRICONSMONO39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-01-10</lastmod></url><url><loc>https://www.cybereason.com/blog/tangerine-turkey</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/From%20Scripts%20to%20Systems-%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations/BLOG_Images_Template_v2%20(28).png</image:loc><image:caption>BLOGImagesTemplatev228</image:caption><image:title>BLOGImagesTemplatev228</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/From%20Scripts%20to%20Systems-%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/capability-vs-usability-blog-featured.png</image:loc><image:caption>capabilityvsusabilityblogfeatured</image:caption><image:title>capabilityvsusabilityblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/From%20Scripts%20to%20Systems-%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations/image5.png</image:loc><image:caption>image5</image:caption><image:title>image5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/BlackSuit/image13.jpg</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2025-10-29</lastmod></url><url><loc>https://www.cybereason.com/resources/ransomware-maturity-model/webinar/us/020923</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Ransomware%20Maturity%20Model-02.09.2023.png</image:loc><image:caption>RansomwareMaturityModel02092023</image:caption><image:title>RansomwareMaturityModel02092023</image:title></image:image><lastmod>2023-03-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-economics-of-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Tyler_Moore.jpg</image:loc><image:caption>TylerMoore</image:caption><image:title>TylerMoore</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/economics-of-cybersecurity-ep-215.png</image:loc><image:caption>economicsofcybersecurityep215</image:caption><image:title>economicsofcybersecurityep215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(1).png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-226-Card.png</image:loc><image:caption>MLEp226Card</image:caption><image:title>MLEp226Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-enhances-xdr-offering-with-empow-acquisition</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(38)-1.png</image:loc><image:caption>CybereasonBlogTemplate381</image:caption><image:title>CybereasonBlogTemplate381</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ravi%20Iyer%20CPO.png</image:loc><image:caption>RaviIyerCPO</image:caption><image:title>RaviIyerCPO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(25).png</image:loc><image:caption>CybereasonBlogTemplate25</image:caption><image:title>CybereasonBlogTemplate25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(32)-1.png</image:loc><image:caption>CybereasonBlogTemplate321</image:caption><image:title>CybereasonBlogTemplate321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/dont-let-fear-uncertainty-and-doubt-derail-your-business-growth</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/UKTN%20logo.jpg</image:loc><image:caption>UKTNlogo</image:caption><image:title>UKTNlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/most-businesses-that-pay-off-after-ransomware-hack-hit-with-second-attack-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsweek%20logo-1.png</image:loc><image:caption>Newsweeklogo1</image:caption><image:title>Newsweeklogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-launches-new-endpoint-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uber-reveals-cover-up-of-hack-affecting-57m-riders-drivers-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/MSN%20logo.png</image:loc><image:caption>MSNlogo</image:caption><image:title>MSNlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cyberattacks-on-athletes-may-be-russian-distraction-tactic-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CIO-Today2.png</image:loc><image:caption>CIOToday2</image:caption><image:title>CIOToday2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/leveraging-indicators-of-behavior-for-early-detection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(7).png</image:loc><image:caption>Vs7</image:caption><image:title>Vs7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IOBs%20paper%20image%20(1).png</image:loc><image:caption>IOBspaperimage1</image:caption><image:title>IOBspaperimage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-10-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-most-complex-cyber-threats-come-from-china-russia-and-even-iran-says-cybereason-cto</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/calcalist%20logo-1.jpg</image:loc><image:caption>calcalistlogo1</image:caption><image:title>calcalistlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-01-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chaes-malware-strikes-customers-of-latin-americas-largest-e-commerce-platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo-2.png</image:loc><image:caption>ZDNetlogo2</image:caption><image:title>ZDNetlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-11-18</lastmod></url><url><loc>https://www.cybereason.com/blog/lapsus-activity-betrays-nation-state-motivation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(3).png</image:loc><image:caption>CybereasonBlogtemplate3</image:caption><image:title>CybereasonBlogtemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-04-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/intellectual-property-theft-operation-attributed-to-winnti-group</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-May-09-2022-03-18-29-38-PM.png</image:loc><image:caption>ComputerWeeklylogoMay09202203182938PM</image:caption><image:title>ComputerWeeklylogoMay09202203182938PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-its-newest-customer-jm-finn</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hot-topics-at-the-rsa-conference-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/esg.jpg</image:loc><image:caption>esg</image:caption><image:title>esg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/russias-offer-to-extradite-attackers-and-a-grain-of-salt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20).png</image:loc><image:caption>CybereasonBlogTemplate20</image:caption><image:title>CybereasonBlogTemplate20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-06-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-eu-expand-access-to-cybersecurity-tools-for-small-businesses</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-May-17-2022-02-39-58-47-PM.png</image:loc><image:caption>SCMagazinelogoMay17202202395847PM</image:caption><image:title>SCMagazinelogoMay17202202395847PM</image:title></image:image><lastmod>2022-05-17</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-makes-big-debut-on-cnbc-2021-disruptor-50-list</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/alert-fatigue-the-silent-epidemic-featured-blog.png</image:loc><image:caption>alertfatiguethesilentepidemicfeaturedblog</image:caption><image:title>alertfatiguethesilentepidemicfeaturedblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-1.png</image:loc><image:caption>CybereasonBlogTemplate51</image:caption><image:title>CybereasonBlogTemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(32)-1.png</image:loc><image:caption>CybereasonBlogTemplate321</image:caption><image:title>CybereasonBlogTemplate321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/resources/upcoming-webinar-ta505</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Reflection_1920x1080-1.jpg</image:loc><image:caption>Reflection1920x10801</image:caption><image:title>Reflection1920x10801</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2019-06-25</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-launches-technology-partner-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Stock%20images/High%20tech%20background%20image%20with%20earth%20planet%20and%20connection%20lines.jpeg</image:loc><image:caption>Hightechbackgroundimagewithearthplanetandconnectionlines</image:caption><image:title>Hightechbackgroundimagewithearthplanetandconnectionlines</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-05-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/5-things-to-consider-with-a-threat-hunting-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/dark_reading1.jpg</image:loc><image:caption>darkreading1</image:caption><image:title>darkreading1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-has-very-quickly-become-the-most-successful-and-common-form-of-cyber-crime</loc><image:image><image:loc>https://www.cybereason.com/hubfs/radioboston%20WBUR.jpg</image:loc><image:caption>radiobostonWBUR</image:caption><image:title>radiobostonWBUR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-05-02</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-deep-2018</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-09-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/winnti-threat-groups-full-infection-chain-for-ip-theft-comes-into-focus</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-May-09-2022-02-36-50-26-PM.png</image:loc><image:caption>SCMagazinelogoMay09202202365026PM</image:caption><image:title>SCMagazinelogoMay09202202365026PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/linkedin-data-breach-blamed-for-multiple-secondary-compromises</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CSO.png</image:loc><image:caption>CSO</image:caption><image:title>CSO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-deepwatch-announce-a-strategic-partnership-to-help-enterprises-stop-advanced-cyber-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/blog/contextualizing-microsofts-source-code-exposure-in-the-solarwinds-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(17)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews171</image:caption><image:title>CopyofBLOGSOCIALSETNews171</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(3).png</image:loc><image:caption>CybereasonBlogtemplate3</image:caption><image:title>CybereasonBlogtemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/solarwinds-blog-hero-2.png</image:loc><image:caption>solarwindsbloghero2</image:caption><image:title>solarwindsbloghero2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-wannacry-profile</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/130%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>130MALICIOUSLIFE</image:caption><image:title>130MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/wannacry-banner.jpg</image:loc><image:caption>wannacrybanner</image:caption><image:title>wannacrybanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(1).png</image:loc><image:caption>MaliciousLifeTemplate1</image:caption><image:title>MaliciousLifeTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-02-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/leadher-cindy-klein-roche-chief-marketing-officer-at-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/venturefizz.png</image:loc><image:caption>venturefizz</image:caption><image:title>venturefizz</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2018-11-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-tesla-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/127%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>127MALICIOUSLIFE</image:caption><image:title>127MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-how-entire-countries-can-lose-the-internet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/how-countries-can-lose-the-internet-ep-213.png</image:loc><image:caption>howcountriescanlosetheinternetep213</image:caption><image:title>howcountriescanlosetheinternetep213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Doug-Madory.jpg</image:loc><image:caption>DougMadory</image:caption><image:title>DougMadory</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-operation-sundevil-and-the-birth-of-the-eff</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7).png</image:loc><image:caption>MaliciousLifeepisode7</image:caption><image:title>MaliciousLifeepisode7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(3).png</image:loc><image:caption>Maliciouslifepodcast3</image:caption><image:title>Maliciouslifepodcast3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-252-featured.png</image:loc><image:caption>MLEp252featured</image:caption><image:title>MLEp252featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2022-05-02</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-bridging-the-communications-gap-between-the-ciso-and-the-board-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_400068763.jpg</image:loc><image:caption>shutterstock400068763</image:caption><image:title>shutterstock400068763</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-15T085736.357.png</image:loc><image:caption>blogposttext20220915T085736357</image:caption><image:title>blogposttext20220915T085736357</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T071527.904.png</image:loc><image:caption>blogposttext20221006T071527904</image:caption><image:title>blogposttext20221006T071527904</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-launches-global-defenders-league-partner-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20%20SOCIAL%20SET%20-%20News.png</image:loc><image:caption>BLOGSOCIALSETNews</image:caption><image:title>BLOGSOCIALSETNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-launches-new-automated-incident-response-solution</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/VentureBeat%20logo-May-09-2022-03-47-34-61-PM.png</image:loc><image:caption>VentureBeatlogoMay09202203473461PM</image:caption><image:title>VentureBeatlogoMay09202203473461PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/services/active-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/platform-bg-shape-sm.png</image:loc><image:caption>platformbgshapesm</image:caption><image:title>platformbgshapesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ServiceSubPageHeader3.png</image:loc><image:caption>ServiceSubPageHeader3</image:caption><image:title>ServiceSubPageHeader3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2019-05-13</lastmod></url><url><loc>https://www.cybereason.com/blog/capability-vs-usability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/From%20Scripts%20to%20Systems-%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations/BLOG_Images_Template_v2%20(28).png</image:loc><image:caption>BLOGImagesTemplatev228</image:caption><image:title>BLOGImagesTemplatev228</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chrome%20Extension%20Campaign.png</image:loc><image:caption>ChromeExtensionCampaign</image:caption><image:title>ChromeExtensionCampaign</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/capability-usability-blog-image-1.png</image:loc><image:caption>capabilityusabilityblogimage1</image:caption><image:title>capabilityusabilityblogimage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/capability-vs-usability-blog-featured.png</image:loc><image:caption>capabilityvsusabilityblogfeatured</image:caption><image:title>capabilityvsusabilityblogfeatured</image:title></image:image><lastmod>2024-08-01</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-the-future-of-endpoint-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/epp-changing-of-the-guard-blog-featured.png</image:loc><image:caption>eppchangingoftheguardblogfeatured</image:caption><image:title>eppchangingoftheguardblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/limor.png</image:loc><image:caption>limor</image:caption><image:title>limor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry.png</image:loc><image:caption>SamCurry</image:caption><image:title>SamCurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3)-2.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews32</image:caption><image:title>CopyofBLOGSOCIALSETNews32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(18).png</image:loc><image:caption>CybereasonBlogTemplate18</image:caption><image:title>CybereasonBlogTemplate18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-10-06</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-djvu-variant-delivered-by-loader-masquerading-as-freeware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat-Alert-GootLoader-SEO-Poisoning.png</image:loc><image:caption>ThreatAlertGootLoaderSEOPoisoning</image:caption><image:title>ThreatAlertGootLoaderSEOPoisoning</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Attack-flow-diagram.png</image:loc><image:caption>Attackflowdiagram</image:caption><image:title>Attackflowdiagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Ralph-Villanueva.png</image:loc><image:caption>RalphVillanueva</image:caption><image:title>RalphVillanueva</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-DJvu-variant-featured-image.png</image:loc><image:caption>threatalertDJvuvariantfeaturedimage</image:caption><image:title>threatalertDJvuvariantfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(8).png</image:loc><image:caption>BLOGImagesTemplatev28</image:caption><image:title>BLOGImagesTemplatev28</image:title></image:image><lastmod>2024-01-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/icedid-malware-compromised-active-directory-domain-in-less-than-a-day</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-Jan-23-2023-06-28-05-8674-PM.png</image:loc><image:caption>MSSPAlertlogoJan2320230628058674PM</image:caption><image:title>MSSPAlertlogoJan2320230628058674PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2023-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-why-are-we-still-failing-at-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(7).png</image:loc><image:caption>CISOStoriespodcast7</image:caption><image:title>CISOStoriespodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/WLC_headshot_SM-0-scaled.jpg</image:loc><image:caption>WLCheadshotSM0scaled</image:caption><image:title>WLCheadshotSM0scaled</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-03-24</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-should-the-u.s.-ban-chinese-and-russian-technology</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/129%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>129MALICIOUSLIFE</image:caption><image:title>129MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(2).png</image:loc><image:caption>MaliciousLifeepisode2</image:caption><image:title>MaliciousLifeepisode2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ira%20winkler.png</image:loc><image:caption>irawinkler</image:caption><image:title>irawinkler</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-241-Card.png</image:loc><image:caption>MLEp241Card</image:caption><image:title>MLEp241Card</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-huawei-ban-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gI_67392_Amit%20Serper%20Photo%202016.png</image:loc><image:caption>gI67392AmitSerperPhoto2016</image:caption><image:title>gI67392AmitSerperPhoto2016</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/76%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>76MALICIOUSLIFE</image:caption><image:title>76MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/mobile-resources</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/Dark_Gunmetal.png</image:loc><image:caption>DarkGunmetal</image:caption><image:title>DarkGunmetal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bg-topography.jpg</image:loc><image:caption>bgtopography</image:caption><image:title>bgtopography</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mobile_Launch_WebBanner_2500x800.png</image:loc><image:caption>MobileLaunchWebBanner2500x800</image:caption><image:title>MobileLaunchWebBanner2500x800</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/top-ten-mobile-use-cases-cover.png</image:loc><image:caption>toptenmobileusecasescover</image:caption><image:title>toptenmobileusecasescover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tag-Cyber.png</image:loc><image:caption>TagCyber</image:caption><image:title>TagCyber</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mobile-Battle-Webinar-HP2.png</image:loc><image:caption>MobileBattleWebinarHP2</image:caption><image:title>MobileBattleWebinarHP2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious_Life_Logo_smaller.png</image:loc><image:caption>MaliciousLifeLogosmaller</image:caption><image:title>MaliciousLifeLogosmaller</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mobile-datasheet-cover.png</image:loc><image:caption>mobiledatasheetcover</image:caption><image:title>mobiledatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mobile-eventbot-hp.png</image:loc><image:caption>mobileeventbothp</image:caption><image:title>mobileeventbothp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-06-19</lastmod></url><url><loc>https://www.cybereason.com/blog/rce-vulnerability-erlang-otp</loc><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(26)-2.png</image:loc><image:caption>CybereasonBlogTemplate262</image:caption><image:title>CybereasonBlogTemplate262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(16).png</image:loc><image:caption>BLOGImagesTemplatev216</image:caption><image:title>BLOGImagesTemplatev216</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/eu-network-information-security-blog-featured.png</image:loc><image:caption>eunetworkinformationsecurityblogfeatured</image:caption><image:title>eunetworkinformationsecurityblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2025-05-27</lastmod></url><url><loc>https://www.cybereason.com/blog/four-considerations-for-evaluating-xdr-platforms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(30).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews30</image:caption><image:title>CopyofBLOGSOCIALSETNews30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-19T122257.609.png</image:loc><image:caption>blogposttext20220919T122257609</image:caption><image:title>blogposttext20220919T122257609</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(28).png</image:loc><image:caption>blogposttext28</image:caption><image:title>blogposttext28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-playboy-locker</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/selling%20project%202.png</image:loc><image:caption>sellingproject2</image:caption><image:title>sellingproject2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/creation%20of%20ransom%20note.png</image:loc><image:caption>creationofransomnote</image:caption><image:title>creationofransomnote</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/web%20based%20builder.png</image:loc><image:caption>webbasedbuilder</image:caption><image:title>webbasedbuilder</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/playboy%20affiliate.png</image:loc><image:caption>playboyaffiliate</image:caption><image:title>playboyaffiliate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/admin%20panels.png</image:loc><image:caption>adminpanels</image:caption><image:title>adminpanels</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/windows%20binary.png</image:loc><image:caption>windowsbinary</image:caption><image:title>windowsbinary</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/instructions.png</image:loc><image:caption>instructions</image:caption><image:title>instructions</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/encrypted%20files.png</image:loc><image:caption>encryptedfiles</image:caption><image:title>encryptedfiles</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/mark-tsipershtein-hs.png</image:loc><image:caption>marktsipershteinhs</image:caption><image:title>marktsipershteinhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/admin%20panel2.png</image:loc><image:caption>adminpanel2</image:caption><image:title>adminpanel2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(3).png</image:loc><image:caption>Vs3</image:caption><image:title>Vs3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(13).png</image:loc><image:caption>BLOGImagesTemplatev213</image:caption><image:title>BLOGImagesTemplatev213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/active%20directory%20domain.png</image:loc><image:caption>activedirectorydomain</image:caption><image:title>activedirectorydomain</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/LDAP%20query.png</image:loc><image:caption>LDAPquery</image:caption><image:title>LDAPquery</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/playboy%20affiliate%202.png</image:loc><image:caption>playboyaffiliate2</image:caption><image:title>playboyaffiliate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/onion.png</image:loc><image:caption>onion</image:caption><image:title>onion</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/multiple%20threads.png</image:loc><image:caption>multiplethreads</image:caption><image:title>multiplethreads</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/request%20for%20beta%20testers%201.png</image:loc><image:caption>requestforbetatesters1</image:caption><image:title>requestforbetatesters1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/selling%20project1%20.png</image:loc><image:caption>sellingproject1</image:caption><image:title>sellingproject1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(2).png</image:loc><image:caption>BLOGImagesTemplatev22</image:caption><image:title>BLOGImagesTemplatev22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/regopen%20key.png</image:loc><image:caption>regopenkey</image:caption><image:title>regopenkey</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/shadow%20copies.png</image:loc><image:caption>shadowcopies</image:caption><image:title>shadowcopies</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/pdf%20file%20encryption.png</image:loc><image:caption>pdffileencryption</image:caption><image:title>pdffileencryption</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/capabilities%20.png</image:loc><image:caption>capabilities</image:caption><image:title>capabilities</image:title></image:image><lastmod>2025-03-25</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-survey-finds-more-than-half-of-the-citizens-in-the-united-states-have-never-heard-of-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/trade-war-china-us-cyberattack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-11T064615.861.png</image:loc><image:caption>blogposttext20221011T064615861</image:caption><image:title>blogposttext20221011T064615861</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/bridging-th-gap-blog-featured.png</image:loc><image:caption>bridgingthgapblogfeatured</image:caption><image:title>bridgingthgapblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_1033114900.jpg</image:loc><image:caption>shutterstock1033114900</image:caption><image:title>shutterstock1033114900</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-04-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/attack-surface-vulnerabilities-increase-as-orgs-respond-to-covid-19-crisis</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-5.jpg</image:loc><image:caption>DarkReadinglogo5</image:caption><image:title>DarkReadinglogo5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-04-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/thought-leadership-blocking-government-backdoors-to-encrypted-messaging-apps...-not</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/rundll32-the-infamous-proxy-for-executing-malicious-code</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Aug-04-2022-09-28-26-04-PM.png</image:loc><image:caption>image3Aug04202209282604PM</image:caption><image:title>image3Aug04202209282604PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Aug-04-2022-09-31-59-46-PM.png</image:loc><image:caption>image16Aug04202209315946PM</image:caption><image:title>image16Aug04202209315946PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Aug-04-2022-09-22-17-74-PM.png</image:loc><image:caption>image10Aug04202209221774PM</image:caption><image:title>image10Aug04202209221774PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tristan%20Madani.png</image:loc><image:caption>TristanMadani</image:caption><image:title>TristanMadani</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Aug-04-2022-09-27-09-11-PM.png</image:loc><image:caption>image11Aug04202209270911PM</image:caption><image:title>image11Aug04202209270911PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Aug-04-2022-09-36-40-89-PM.png</image:loc><image:caption>image1Aug04202209364089PM</image:caption><image:title>image1Aug04202209364089PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Aug-04-2022-09-32-49-37-PM.png</image:loc><image:caption>image7Aug04202209324937PM</image:caption><image:title>image7Aug04202209324937PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-Aug-04-2022-09-20-06-04-PM.png</image:loc><image:caption>image17Aug04202209200604PM</image:caption><image:title>image17Aug04202209200604PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-Aug-04-2022-09-38-19-93-PM.png</image:loc><image:caption>image23Aug04202209381993PM</image:caption><image:title>image23Aug04202209381993PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Aug-04-2022-09-29-17-43-PM.png</image:loc><image:caption>image15Aug04202209291743PM</image:caption><image:title>image15Aug04202209291743PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image22-Aug-04-2022-09-17-36-61-PM.png</image:loc><image:caption>image22Aug04202209173661PM</image:caption><image:title>image22Aug04202209173661PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-Aug-04-2022-09-18-59-17-PM.png</image:loc><image:caption>image18Aug04202209185917PM</image:caption><image:title>image18Aug04202209185917PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-Aug-04-2022-09-23-12-61-PM.png</image:loc><image:caption>image21Aug04202209231261PM</image:caption><image:title>image21Aug04202209231261PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Aug-04-2022-09-35-30-12-PM.png</image:loc><image:caption>image9Aug04202209353012PM</image:caption><image:title>image9Aug04202209353012PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Aug-04-2022-09-13-43-60-PM.png</image:loc><image:caption>image12Aug04202209134360PM</image:caption><image:title>image12Aug04202209134360PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-Aug-04-2022-09-31-22-47-PM.png</image:loc><image:caption>image20Aug04202209312247PM</image:caption><image:title>image20Aug04202209312247PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Aug-04-2022-09-21-44-63-PM.png</image:loc><image:caption>image5Aug04202209214463PM</image:caption><image:title>image5Aug04202209214463PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(123).png</image:loc><image:caption>blogposttext123</image:caption><image:title>blogposttext123</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Aug-04-2022-09-30-35-03-PM.png</image:loc><image:caption>image8Aug04202209303503PM</image:caption><image:title>image8Aug04202209303503PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Aug-04-2022-09-34-33-88-PM.png</image:loc><image:caption>image4Aug04202209343388PM</image:caption><image:title>image4Aug04202209343388PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-Aug-04-2022-09-25-50-93-PM.png</image:loc><image:caption>image19Aug04202209255093PM</image:caption><image:title>image19Aug04202209255093PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Aug-04-2022-09-24-44-31-PM.png</image:loc><image:caption>image2Aug04202209244431PM</image:caption><image:title>image2Aug04202209244431PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Aug-04-2022-09-23-56-58-PM.png</image:loc><image:caption>image13Aug04202209235658PM</image:caption><image:title>image13Aug04202209235658PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Aug-04-2022-09-40-47-03-PM.png</image:loc><image:caption>image14Aug04202209404703PM</image:caption><image:title>image14Aug04202209404703PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><lastmod>2023-04-10</lastmod></url><url><loc>https://www.cybereason.com/resources/hacking-the-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/YELLOW_THREAT_ALERT_CR_ICONS-53.svg</image:loc><image:caption>YELLOWTHREATALERTCRICONS53</image:caption><image:title>YELLOWTHREATALERTCRICONS53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/eventbot-comes-online-amid-flurry-of-regularly-updated-banking-trojans</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cyberscoop-1.png</image:loc><image:caption>Cyberscoop1</image:caption><image:title>Cyberscoop1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-04-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereasons-newly-launched-partner-program-provides-one-stop-shop-for-partners-boasts-many-benefits</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CRN-TV1.jpg</image:loc><image:caption>CRNTV1</image:caption><image:title>CRNTV1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/threat-alert-pyvil-rat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-impacted-geo.png</image:loc><image:caption>criconimpactedgeo</image:caption><image:title>criconimpactedgeo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner-Page-Icons-03.png</image:loc><image:caption>PartnerPageIcons03</image:caption><image:title>PartnerPageIcons03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/icons-all/Asset%203.png</image:loc><image:caption>Asset3</image:caption><image:title>Asset3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/icons-all/Asset%201077.png</image:loc><image:caption>Asset1077</image:caption><image:title>Asset1077</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-attack-goal.png</image:loc><image:caption>criconattackgoal</image:caption><image:title>criconattackgoal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-hero-bg.jpg</image:loc><image:caption>threatalertherobg</image:caption><image:title>threatalertherobg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-remediate-disable.png</image:loc><image:caption>criconremediatedisable</image:caption><image:title>criconremediatedisable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ORANGE_THREAT_ALERT_CR_ICONS-54.svg</image:loc><image:caption>ORANGETHREATALERTCRICONS54</image:caption><image:title>ORANGETHREATALERTCRICONS54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-threat-type.png</image:loc><image:caption>criconthreattype</image:caption><image:title>criconthreattype</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-badge-orange.png</image:loc><image:caption>threatalertbadgeorange</image:caption><image:title>threatalertbadgeorange</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-does-code-free-speech</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MLPodcast143.png</image:loc><image:caption>MLPodcast143</image:caption><image:title>MLPodcast143</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-252-featured.png</image:loc><image:caption>MLEp252featured</image:caption><image:title>MLEp252featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(12).png</image:loc><image:caption>MaliciousLifeepisode12</image:caption><image:title>MaliciousLifeepisode12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-01-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/eventbot-malware-can-steal-banking-data-from-your-android-phone-how-to-stay-safe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20News-5.png</image:loc><image:caption>YahooNews5</image:caption><image:title>YahooNews5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-05-20</lastmod></url><url><loc>https://www.cybereason.com/blog/buyer-beware-tips-for-secure-online-shopping-during-the-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CybereasonBlogHeroTemplate</image:caption><image:title>CybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee.png</image:loc><image:caption>Employee</image:caption><image:title>Employee</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/holiday-shopping-blog-b.png</image:loc><image:caption>holidayshoppingblogb</image:caption><image:title>holidayshoppingblogb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/kyle_headshot.jpeg</image:loc><image:caption>kyleheadshot</image:caption><image:title>kyleheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2020-11-18</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-strategic-alliance-with-synnex-corporation-to-help-end-cyber-attacks-for-smbs-and-enterprises</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-01-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/80-of-ransomware-victims-suffer-repeat-attacks-according-to-new-cybereason-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CBS%20News%20logo.jpg</image:loc><image:caption>CBSNewslogo</image:caption><image:title>CBSNewslogo</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/where-are-they-now-checking-in-on-our-top-50-startups-to-watch</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sam-curry-speaks-with-good-morning-america-about-the-darkside-threat-group</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Good%20Morning%20America%20logo-1.png</image:loc><image:caption>GoodMorningAmericalogo1</image:caption><image:title>GoodMorningAmericalogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-05-27</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-paving-the-way-nextgen-ciso</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(77).png</image:loc><image:caption>blogposttext77</image:caption><image:title>blogposttext77</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/CISO-blog-banner.jpg</image:loc><image:caption>CISOblogbanner</image:caption><image:title>CISOblogbanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-report-complex-ransomops-fuel-explosion-in-2021-ransomware-economy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/russia-leads-the-nation-state-attack-pack-against-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-1.png</image:loc><image:caption>SCMagazine1</image:caption><image:title>SCMagazine1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2018-07-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/top-10-cybersecurity-startups</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AI%20Magazine%20logo.png</image:loc><image:caption>AIMagazinelogo</image:caption><image:title>AIMagazinelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-09-14</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-big-cannons</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/480px-Bruce_Schneier_at_CoPS2013-IMG_9174.jpg</image:loc><image:caption>480pxBruceSchneieratCoPS2013IMG9174</image:caption><image:title>480pxBruceSchneieratCoPS2013IMG9174</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20(4).png</image:loc><image:caption>BLOG4</image:caption><image:title>BLOG4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot_of_Electronic_Disturbance_Theater_Floodnet_from_September_9th_1998.jpg</image:loc><image:caption>ScreenshotofElectronicDisturbanceTheaterFloodnetfromSeptember9th1998</image:caption><image:title>ScreenshotofElectronicDisturbanceTheaterFloodnetfromSeptember9th1998</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(17).png</image:loc><image:caption>MaliciousLifeepisode17</image:caption><image:title>MaliciousLifeepisode17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/YossiCropped-1.jpeg</image:loc><image:caption>YossiCropped1</image:caption><image:title>YossiCropped1</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-best-ransomware-protection-of-2017-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/PC-Magazine.png</image:loc><image:caption>PCMagazine</image:caption><image:title>PCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/services/threat-intelligence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/DATA_TRANSFER_CR_ICONS_BATCH_2%20copy-03.svg</image:loc><image:caption>DATATRANSFERCRICONSBATCH2copy03</image:caption><image:title>DATATRANSFERCRICONSBATCH2copy03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/IR_ProfService_Brief_v1_Thumbnail.png</image:loc><image:caption>IRProfServiceBriefv1Thumbnail</image:caption><image:title>IRProfServiceBriefv1Thumbnail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-icon--black.svg</image:loc><image:caption>crlogoiconblack</image:caption><image:title>crlogoiconblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ACCESS_FORENSICS_CR_ICONS-16.svg</image:loc><image:caption>ACCESSFORENSICSCRICONS16</image:caption><image:title>ACCESSFORENSICSCRICONS16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/NETWORK_ARCHITECTURE_CR_ICONS_BATCH_2%20copy-20.svg</image:loc><image:caption>NETWORKARCHITECTURECRICONSBATCH2copy20</image:caption><image:title>NETWORKARCHITECTURECRICONSBATCH2copy20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/IR_Service_v1_thumbnail-min.png</image:loc><image:caption>IRServicev1thumbnailmin</image:caption><image:title>IRServicev1thumbnailmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/iconsand.png</image:loc><image:caption>iconsand</image:caption><image:title>iconsand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--xdr-gradient.jpg</image:loc><image:caption>crbgheroxdrgradient</image:caption><image:title>crbgheroxdrgradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/ATTACK_GOAL_CR_ICONS-33.svg</image:loc><image:caption>ATTACKGOALCRICONS33</image:caption><image:title>ATTACKGOALCRICONS33</image:title></image:image><lastmod>2023-02-13</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-joins-ibm-security-app-exchange-community</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-03-29</lastmod></url><url><loc>https://www.cybereason.com/blog/research/glupteba-expands-operation-and-toolkit-with-lolbins-cryptominer-and-router-exploit</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-40.png</image:loc><image:caption>WorkinprogressGlupteba40</image:caption><image:title>WorkinprogressGlupteba40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-9.png</image:loc><image:caption>WorkinprogressGlupteba9</image:caption><image:title>WorkinprogressGlupteba9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-37.png</image:loc><image:caption>WorkinprogressGlupteba37</image:caption><image:title>WorkinprogressGlupteba37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-13.png</image:loc><image:caption>WorkinprogressGlupteba13</image:caption><image:title>WorkinprogressGlupteba13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-7.png</image:loc><image:caption>WorkinprogressGlupteba7</image:caption><image:title>WorkinprogressGlupteba7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-34.png</image:loc><image:caption>WorkinprogressGlupteba34</image:caption><image:title>WorkinprogressGlupteba34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-129.png</image:loc><image:caption>image129</image:caption><image:title>image129</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-30.png</image:loc><image:caption>WorkinprogressGlupteba30</image:caption><image:title>WorkinprogressGlupteba30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-39.png</image:loc><image:caption>WorkinprogressGlupteba39</image:caption><image:title>WorkinprogressGlupteba39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-6.png</image:loc><image:caption>WorkinprogressGlupteba6</image:caption><image:title>WorkinprogressGlupteba6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-26.png</image:loc><image:caption>WorkinprogressGlupteba26</image:caption><image:title>WorkinprogressGlupteba26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-17.png</image:loc><image:caption>WorkinprogressGlupteba17</image:caption><image:title>WorkinprogressGlupteba17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-10.png</image:loc><image:caption>WorkinprogressGlupteba10</image:caption><image:title>WorkinprogressGlupteba10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-16.png</image:loc><image:caption>WorkinprogressGlupteba16</image:caption><image:title>WorkinprogressGlupteba16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-2.png</image:loc><image:caption>WorkinprogressGlupteba2</image:caption><image:title>WorkinprogressGlupteba2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-29.png</image:loc><image:caption>WorkinprogressGlupteba29</image:caption><image:title>WorkinprogressGlupteba29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-42.png</image:loc><image:caption>WorkinprogressGlupteba42</image:caption><image:title>WorkinprogressGlupteba42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-32.png</image:loc><image:caption>WorkinprogressGlupteba32</image:caption><image:title>WorkinprogressGlupteba32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-8.png</image:loc><image:caption>WorkinprogressGlupteba8</image:caption><image:title>WorkinprogressGlupteba8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-20.png</image:loc><image:caption>WorkinprogressGlupteba20</image:caption><image:title>WorkinprogressGlupteba20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-133.png</image:loc><image:caption>image133</image:caption><image:title>image133</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba.png</image:loc><image:caption>WorkinprogressGlupteba</image:caption><image:title>WorkinprogressGlupteba</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-23.png</image:loc><image:caption>WorkinprogressGlupteba23</image:caption><image:title>WorkinprogressGlupteba23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-43.png</image:loc><image:caption>WorkinprogressGlupteba43</image:caption><image:title>WorkinprogressGlupteba43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-12.png</image:loc><image:caption>WorkinprogressGlupteba12</image:caption><image:title>WorkinprogressGlupteba12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-132.png</image:loc><image:caption>image132</image:caption><image:title>image132</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(88).png</image:loc><image:caption>blogposttext88</image:caption><image:title>blogposttext88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-131.png</image:loc><image:caption>image131</image:caption><image:title>image131</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-11.png</image:loc><image:caption>WorkinprogressGlupteba11</image:caption><image:title>WorkinprogressGlupteba11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202019-09-11%20at%206.38.49%20PM.png</image:loc><image:caption>ScreenShot20190911at63849PM</image:caption><image:title>ScreenShot20190911at63849PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-27.png</image:loc><image:caption>WorkinprogressGlupteba27</image:caption><image:title>WorkinprogressGlupteba27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-35.png</image:loc><image:caption>WorkinprogressGlupteba35</image:caption><image:title>WorkinprogressGlupteba35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-4.png</image:loc><image:caption>WorkinprogressGlupteba4</image:caption><image:title>WorkinprogressGlupteba4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-33.png</image:loc><image:caption>WorkinprogressGlupteba33</image:caption><image:title>WorkinprogressGlupteba33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-21.png</image:loc><image:caption>WorkinprogressGlupteba21</image:caption><image:title>WorkinprogressGlupteba21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-28.png</image:loc><image:caption>WorkinprogressGlupteba28</image:caption><image:title>WorkinprogressGlupteba28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-41.png</image:loc><image:caption>WorkinprogressGlupteba41</image:caption><image:title>WorkinprogressGlupteba41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-130.png</image:loc><image:caption>image130</image:caption><image:title>image130</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-22.png</image:loc><image:caption>WorkinprogressGlupteba22</image:caption><image:title>WorkinprogressGlupteba22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-36.png</image:loc><image:caption>WorkinprogressGlupteba36</image:caption><image:title>WorkinprogressGlupteba36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-5.png</image:loc><image:caption>WorkinprogressGlupteba5</image:caption><image:title>WorkinprogressGlupteba5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-25.png</image:loc><image:caption>WorkinprogressGlupteba25</image:caption><image:title>WorkinprogressGlupteba25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-14.png</image:loc><image:caption>WorkinprogressGlupteba14</image:caption><image:title>WorkinprogressGlupteba14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-18.png</image:loc><image:caption>WorkinprogressGlupteba18</image:caption><image:title>WorkinprogressGlupteba18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-19.png</image:loc><image:caption>WorkinprogressGlupteba19</image:caption><image:title>WorkinprogressGlupteba19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-15.png</image:loc><image:caption>WorkinprogressGlupteba15</image:caption><image:title>WorkinprogressGlupteba15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Work%20in%20progress%20-%20Glupteba-3.png</image:loc><image:caption>WorkinprogressGlupteba3</image:caption><image:title>WorkinprogressGlupteba3</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/real-time-detection-of-escalated-privileges-now-possible</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs.png</image:loc><image:caption>Vs</image:caption><image:title>Vs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(99).png</image:loc><image:caption>blogposttext99</image:caption><image:title>blogposttext99</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/the-importance-of-actionable-threat-intelligence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(126).png</image:loc><image:caption>blogposttext126</image:caption><image:title>blogposttext126</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-30T082701.462.png</image:loc><image:caption>blogposttext20220830T082701462</image:caption><image:title>blogposttext20220830T082701462</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Aug-30-2022-03-29-30-80-PM.png</image:loc><image:caption>image1Aug30202203293080PM</image:caption><image:title>image1Aug30202203293080PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(122).png</image:loc><image:caption>blogposttext122</image:caption><image:title>blogposttext122</image:title></image:image><lastmod>2022-08-31</lastmod></url><url><loc>https://www.cybereason.com/blog/identifying-and-preventing-bin-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20img%20lummastealer-1.png</image:loc><image:caption>blogimglummastealer1</image:caption><image:title>blogimglummastealer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(11).png</image:loc><image:caption>BLOGImagesTemplatev211</image:caption><image:title>BLOGImagesTemplatev211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/From%20Scripts%20to%20Systems-%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations/BLOG_Images_Template_v2%20(28).png</image:loc><image:caption>BLOGImagesTemplatev228</image:caption><image:title>BLOGImagesTemplatev228</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2025-03-11</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-launches-global-partner-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-18</lastmod></url><url><loc>https://www.cybereason.com/protecting-healthcare-industry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/mcbee-video-thumbnai.png</image:loc><image:caption>mcbeevideothumbnai</image:caption><image:title>mcbeevideothumbnai</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/syringe_1024.png</image:loc><image:caption>syringe1024</image:caption><image:title>syringe1024</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/rti-surgical-white.png</image:loc><image:caption>rtisurgicalwhite</image:caption><image:title>rtisurgicalwhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mcbee-logo-white.png</image:loc><image:caption>mcbeelogowhite</image:caption><image:title>mcbeelogowhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gray-bg.jpg</image:loc><image:caption>graybg</image:caption><image:title>graybg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/platform-bg-shape-sm.png</image:loc><image:caption>platformbgshapesm</image:caption><image:title>platformbgshapesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mount-sinai-health-system.png</image:loc><image:caption>mountsinaihealthsystem</image:caption><image:title>mountsinaihealthsystem</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1arm-landing-hero.jpg</image:loc><image:caption>1armlandinghero</image:caption><image:title>1armlandinghero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-08-13</lastmod></url><url><loc>https://www.cybereason.com/blog/the-internet-of-noise-threatens-to-choke-the-information-ecosystem-with-digital-pollution</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_516034087.jpg</image:loc><image:caption>shutterstock516034087</image:caption><image:title>shutterstock516034087</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/research/the-hole-in-the-bucket-attackers-abuse-bitbucket-to-deliver-an-arsenal-of-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Untitled7778.png</image:loc><image:caption>Untitled7778</image:caption><image:title>Untitled7778</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-12.png</image:loc><image:caption>image512</image:caption><image:title>image512</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-11.png</image:loc><image:caption>image411</image:caption><image:title>image411</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-9.png</image:loc><image:caption>image109</image:caption><image:title>image109</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Untitledgfff5.png</image:loc><image:caption>Untitledgfff5</image:caption><image:title>Untitledgfff5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bitbucket-flow-payload.png</image:loc><image:caption>Bitbucketflowpayload</image:caption><image:title>Bitbucketflowpayload</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Untitled554.png</image:loc><image:caption>Untitled554</image:caption><image:title>Untitled554</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-15.png</image:loc><image:caption>image315</image:caption><image:title>image315</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-10.png</image:loc><image:caption>image710</image:caption><image:title>image710</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Untitledtrtr.png</image:loc><image:caption>Untitledtrtr</image:caption><image:title>Untitledtrtr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-6.png</image:loc><image:caption>image206</image:caption><image:title>image206</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-9.png</image:loc><image:caption>image99</image:caption><image:title>image99</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-7.png</image:loc><image:caption>image177</image:caption><image:title>image177</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/323.png</image:loc><image:caption>323</image:caption><image:title>323</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-10.png</image:loc><image:caption>image610</image:caption><image:title>image610</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Untitled78.png</image:loc><image:caption>Untitled78</image:caption><image:title>Untitled78</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/bitbucket-blog-image.png</image:loc><image:caption>bitbucketblogimage</image:caption><image:title>bitbucketblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-8.png</image:loc><image:caption>image118</image:caption><image:title>image118</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-6.png</image:loc><image:caption>image186</image:caption><image:title>image186</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-9.png</image:loc><image:caption>image159</image:caption><image:title>image159</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-10.png</image:loc><image:caption>image1310</image:caption><image:title>image1310</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-16.png</image:loc><image:caption>image216</image:caption><image:title>image216</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-10.png</image:loc><image:caption>image1410</image:caption><image:title>image1410</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereasons-executives-headline-speaking-sessions-at-the-rsa-conference-and-the-agc-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-half-life-2-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(21).png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/23%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>23MALICIOUSLIFE1</image:caption><image:title>23MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-sam-curry-named-a-visiting-fellow-by-the-national-security-institute</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/resources/seton-hall-university-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/seton-hall-cs-cover.png</image:loc><image:caption>setonhallcscover</image:caption><image:title>setonhallcscover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-04-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/deloitte-breach-underlines-need-for-better-authentication</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CW_Logo-hero.jpg</image:loc><image:caption>CWLogohero</image:caption><image:title>CWLogohero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-march-31st-live-attack-simulation-xdr-vs.-modern-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ken_headshot.png</image:loc><image:caption>Kenheadshot</image:caption><image:title>Kenheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(113).png</image:loc><image:caption>blogposttext113</image:caption><image:title>blogposttext113</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/eric-hex-hs.png</image:loc><image:caption>erichexhs</image:caption><image:title>erichexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(95).png</image:loc><image:caption>blogposttext95</image:caption><image:title>blogposttext95</image:title></image:image><lastmod>2022-03-17</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-discovers-large-scale-corporate-espionage-hacking-operation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/russian-hacking-attacks-could-flood-us-cities-with-sewage-and-cause-deadly-explosions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20News-1.png</image:loc><image:caption>YahooNews1</image:caption><image:title>YahooNews1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-08-13</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-raspberry-robin-worm-abuses-windows-installer-and-qnap-devices</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Jul-07-2022-01-53-19-99-PM.png</image:loc><image:caption>image1Jul07202201531999PM</image:caption><image:title>image1Jul07202201531999PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Jul-07-2022-01-52-37-71-PM.png</image:loc><image:caption>image8Jul07202201523771PM</image:caption><image:title>image8Jul07202201523771PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Jul-07-2022-01-47-56-82-PM.png</image:loc><image:caption>image9Jul07202201475682PM</image:caption><image:title>image9Jul07202201475682PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Jul-07-2022-01-55-22-85-PM.png</image:loc><image:caption>image12Jul07202201552285PM</image:caption><image:title>image12Jul07202201552285PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27-1.jpg</image:loc><image:caption>image271</image:caption><image:title>image271</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Jul-07-2022-01-52-10-21-PM.png</image:loc><image:caption>image5Jul07202201521021PM</image:caption><image:title>image5Jul07202201521021PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Jul-07-2022-01-56-33-12-PM.png</image:loc><image:caption>image2Jul07202201563312PM</image:caption><image:title>image2Jul07202201563312PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T112617.289.png</image:loc><image:caption>blogposttext20221003T112617289</image:caption><image:title>blogposttext20221003T112617289</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Jul-07-2022-01-47-17-18-PM.png</image:loc><image:caption>image4Jul07202201471718PM</image:caption><image:title>image4Jul07202201471718PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Jul-07-2022-01-49-38-13-PM.png</image:loc><image:caption>image6Jul07202201493813PM</image:caption><image:title>image6Jul07202201493813PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Jul-07-2022-01-54-14-11-PM.png</image:loc><image:caption>image10Jul07202201541411PM</image:caption><image:title>image10Jul07202201541411PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Jul-07-2022-01-50-19-57-PM.png</image:loc><image:caption>image11Jul07202201501957PM</image:caption><image:title>image11Jul07202201501957PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(2).png</image:loc><image:caption>ImagefromiOS2</image:caption><image:title>ImagefromiOS2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Jul-07-2022-01-48-53-32-PM.png</image:loc><image:caption>image13Jul07202201485332PM</image:caption><image:title>image13Jul07202201485332PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Jul-07-2022-01-51-19-16-PM.png</image:loc><image:caption>image3Jul07202201511916PM</image:caption><image:title>image3Jul07202201511916PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-07-21</lastmod></url><url><loc>https://www.cybereason.com/resources/mitre-attack-evaluations-2023/webinar/us/092823</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/MITRE-Banner-09.28.23.png</image:loc><image:caption>MITREBanner092823</image:caption><image:title>MITREBanner092823</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2023-11-07</lastmod></url><url><loc>https://www.cybereason.com/blog/research/operation-ghostshell-novel-rat-targets-global-aerospace-and-telecoms-firms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Oct-01-2021-06-29-42-26-PM.png</image:loc><image:caption>image9Oct01202106294226PM</image:caption><image:title>image9Oct01202106294226PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image28-3.png</image:loc><image:caption>image283</image:caption><image:title>image283</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-Oct-01-2021-06-16-43-67-PM.png</image:loc><image:caption>image21Oct01202106164367PM</image:caption><image:title>image21Oct01202106164367PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Oct-01-2021-06-08-59-58-PM.png</image:loc><image:caption>image16Oct01202106085958PM</image:caption><image:title>image16Oct01202106085958PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Oct-04-2021-03-18-44-06-PM.png</image:loc><image:caption>image12Oct04202103184406PM</image:caption><image:title>image12Oct04202103184406PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Oct-01-2021-06-06-36-68-PM.png</image:loc><image:caption>image7Oct01202106063668PM</image:caption><image:title>image7Oct01202106063668PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-Oct-01-2021-06-22-55-22-PM.png</image:loc><image:caption>image23Oct01202106225522PM</image:caption><image:title>image23Oct01202106225522PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(34).png</image:loc><image:caption>image34</image:caption><image:title>image34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27-4.png</image:loc><image:caption>image274</image:caption><image:title>image274</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-Oct-01-2021-06-21-29-63-PM.png</image:loc><image:caption>image19Oct01202106212963PM</image:caption><image:title>image19Oct01202106212963PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(88).png</image:loc><image:caption>blogposttext88</image:caption><image:title>blogposttext88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Daniel-F-HS-1-1.png</image:loc><image:caption>DanielFHS11</image:caption><image:title>DanielFHS11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Oct-01-2021-06-01-05-16-PM.png</image:loc><image:caption>image5Oct01202106010516PM</image:caption><image:title>image5Oct01202106010516PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image30-2.png</image:loc><image:caption>image302</image:caption><image:title>image302</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/assaf.jpg</image:loc><image:caption>assaf</image:caption><image:title>assaf</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image22-Oct-01-2021-06-20-27-51-PM.png</image:loc><image:caption>image22Oct01202106202751PM</image:caption><image:title>image22Oct01202106202751PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Oct-01-2021-06-28-38-20-PM.png</image:loc><image:caption>image12Oct01202106283820PM</image:caption><image:title>image12Oct01202106283820PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image33-Oct-01-2021-06-27-38-17-PM.png</image:loc><image:caption>image33Oct01202106273817PM</image:caption><image:title>image33Oct01202106273817PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-Oct-01-2021-06-15-02-76-PM.png</image:loc><image:caption>image24Oct01202106150276PM</image:caption><image:title>image24Oct01202106150276PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image25-3.png</image:loc><image:caption>image253</image:caption><image:title>image253</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-3.png</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image35-3.png</image:loc><image:caption>image353</image:caption><image:title>image353</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Oct-01-2021-06-30-45-41-PM.png</image:loc><image:caption>image4Oct01202106304541PM</image:caption><image:title>image4Oct01202106304541PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(35).png</image:loc><image:caption>image35</image:caption><image:title>image35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Oct-01-2021-06-18-15-23-PM.png</image:loc><image:caption>image13Oct01202106181523PM</image:caption><image:title>image13Oct01202106181523PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20%20SOCIAL%20SET%20-%20News%20(1)-1.png</image:loc><image:caption>BLOGSOCIALSETNews11</image:caption><image:title>BLOGSOCIALSETNews11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-Oct-01-2021-06-24-46-23-PM.png</image:loc><image:caption>image18Oct01202106244623PM</image:caption><image:title>image18Oct01202106244623PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2024-08-12</lastmod></url><url><loc>https://www.cybereason.com/blog/soc-modernization-a-mission-to-block-or-to-disrupt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/eu-network-information-security-blog-featured.png</image:loc><image:caption>eunetworkinformationsecurityblogfeatured</image:caption><image:title>eunetworkinformationsecurityblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(21)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews211</image:caption><image:title>CopyofBLOGSOCIALSETNews211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(62).png</image:loc><image:caption>blogposttext62</image:caption><image:title>blogposttext62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-03-29</lastmod></url><url><loc>https://www.cybereason.com/press/gartner-peer-insights-edr-2019</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/resources/oracle-mimikatz-dll-hijacking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-featured-image.png</image:loc><image:caption>crfeaturedimage</image:caption><image:title>crfeaturedimage</image:title></image:image><lastmod>2022-07-19</lastmod></url><url><loc>https://www.cybereason.com/resources/no-win32-process-needed-expanding-the-wmi-lateral-movement-arsenal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/chris-davis-9963%20(2)-1.jpg</image:loc><image:caption>chrisdavis996321</image:caption><image:title>chrisdavis996321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-05-09</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-exposes-malware-campaign-targeting-us-taxpayers-just-weeks-before-2021-filing-deadline</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-03-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/80-percent-of-ransomware-victims-suffer-repeat-attacks-new-report-says</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSN%20logo-Jun-17-2021-02-38-15-75-AM.png</image:loc><image:caption>MSNlogoJun17202102381575AM</image:caption><image:title>MSNlogoJun17202102381575AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-inside-clearview-ai-facial-recognition-0-0</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/andrew-maximov.png</image:loc><image:caption>andrewmaximov</image:caption><image:title>andrewmaximov</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-244-Card.png</image:loc><image:caption>MLEp244Card</image:caption><image:title>MLEp244Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ted-claypool.png</image:loc><image:caption>tedclaypool</image:caption><image:title>tedclaypool</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-242-Card.png</image:loc><image:caption>MLEp242Card</image:caption><image:title>MLEp242Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/100%20-%20MALICIOUS%20LIFE%20(1).png</image:loc><image:caption>100MALICIOUSLIFE1</image:caption><image:title>100MALICIOUSLIFE1</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/researchers-warn-of-rasberry-robins-worm-targeting-windows-users</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Hacker%20News%20logo-2.jpg</image:loc><image:caption>TheHackerNewslogo2</image:caption><image:title>TheHackerNewslogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/resources/scm-case-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/scm-case-study-card2.png</image:loc><image:caption>scmcasestudycard2</image:caption><image:title>scmcasestudycard2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-03-29</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-tay-a-teenage-bot-gone-rogue</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/139%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>139MALICIOUSLIFE</image:caption><image:title>139MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5).png</image:loc><image:caption>MaliciousLifeepisode5</image:caption><image:title>MaliciousLifeepisode5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><lastmod>2021-12-06</lastmod></url><url><loc>https://www.cybereason.com/blog/research/novel-chaes-malware-underscores-heightened-e-commerce-risk-this-holiday-season</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/132%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>132MALICIOUSLIFE1</image:caption><image:title>132MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/anydesk-breach-blog-featured.png</image:loc><image:caption>anydeskbreachblogfeatured</image:caption><image:title>anydeskbreachblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eli-salem-hs.png</image:loc><image:caption>elisalemhs</image:caption><image:title>elisalemhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/chaes-malware-blog-card.png</image:loc><image:caption>chaesmalwareblogcard</image:caption><image:title>chaesmalwareblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/chaes-malware-blog-image-1.jpg</image:loc><image:caption>chaesmalwareblogimage1</image:caption><image:title>chaesmalwareblogimage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/fr/</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Approved%20Customer%20Logos/Customer-Logo-Motorola-Black.png</image:loc><image:caption>CustomerLogoMotorolaBlack</image:caption><image:title>CustomerLogoMotorolaBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-detectia-v2-1500px.png</image:loc><image:caption>crowlshowcasedetectiav21500px</image:caption><image:title>crowlshowcasedetectiav21500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cropped/cr-icon-cropped-mono-45.png</image:loc><image:caption>criconcroppedmono45</image:caption><image:title>criconcroppedmono45</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/activecampaign-bw.svg</image:loc><image:caption>activecampaignbw</image:caption><image:title>activecampaignbw</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase__mobile-group-respondor.png</image:loc><image:caption>crowlshowcasemobilegrouprespondor</image:caption><image:title>crowlshowcasemobilegrouprespondor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/quote-photo@2x.png</image:loc><image:caption>quotephoto2x</image:caption><image:title>quotephoto2x</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zoom.jpg</image:loc><image:caption>zoom</image:caption><image:title>zoom</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/cr-platform-graphic-2024.png</image:loc><image:caption>crplatformgraphic2024</image:caption><image:title>crplatformgraphic2024</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Approved%20Customer%20Logos/Customer-Logo-Softbank-Black.png</image:loc><image:caption>CustomerLogoSoftbankBlack</image:caption><image:title>CustomerLogoSoftbankBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-respondor-v2-850px.png</image:loc><image:caption>crowlshowcaserespondorv2850px</image:caption><image:title>crowlshowcaserespondorv2850px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase__mobile-group-preventid.png</image:loc><image:caption>crowlshowcasemobilegrouppreventid</image:caption><image:title>crowlshowcasemobilegrouppreventid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/Korean_Air_Logo-BW.png</image:loc><image:caption>KoreanAirLogoBW</image:caption><image:title>KoreanAirLogoBW</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-preventid-1500px.png</image:loc><image:caption>crowlshowcasepreventid1500px</image:caption><image:title>crowlshowcasepreventid1500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__four-lines-185px.png</image:loc><image:caption>crshapestackfourlines185px</image:caption><image:title>crshapestackfourlines185px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cropped/cr-icon-cropped-mono-14.png</image:loc><image:caption>criconcroppedmono14</image:caption><image:title>criconcroppedmono14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-square-multicolor.png</image:loc><image:caption>crshapestackthreesquaremulticolor</image:caption><image:title>crshapestackthreesquaremulticolor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-detectia--in-flight.webp</image:loc><image:caption>crowldetectiainflight</image:caption><image:title>crowldetectiainflight</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cropped/cr-icon-cropped-mono-26.png</image:loc><image:caption>criconcroppedmono26</image:caption><image:title>criconcroppedmono26</image:title></image:image><lastmod>2024-05-13</lastmod></url><url><loc>https://www.cybereason.com/blog/iot-security-its-not-too-late-to-get-it-right</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ivanti-threat-alert-blog-featured.png</image:loc><image:caption>ivantithreatalertblogfeatured</image:caption><image:title>ivantithreatalertblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_SonicWall.png</image:loc><image:caption>BLOGImagesSonicWall</image:caption><image:title>BLOGImagesSonicWall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/most-organizations-that-paid-a-ransom-were-hit-with-a-second-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Jun-10-2022-02-07-16-04-AM.png</image:loc><image:caption>SCMagazinelogoJun10202202071604AM</image:caption><image:title>SCMagazinelogoJun10202202071604AM</image:title></image:image><lastmod>2022-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/eu-network-information-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(26)-2.png</image:loc><image:caption>CybereasonBlogTemplate262</image:caption><image:title>CybereasonBlogTemplate262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(3).png</image:loc><image:caption>MaliciousLifeTemplate3</image:caption><image:title>MaliciousLifeTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/eu-network-information-security-blog-featured.png</image:loc><image:caption>eunetworkinformationsecurityblogfeatured</image:caption><image:title>eunetworkinformationsecurityblogfeatured</image:title></image:image><lastmod>2023-10-25</lastmod></url><url><loc>https://www.cybereason.com/blog/brazilian-financial-malware-dll-hijacking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image34-1.png</image:loc><image:caption>image341</image:caption><image:title>image341</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-2.png</image:loc><image:caption>image232</image:caption><image:title>image232</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image41-1.png</image:loc><image:caption>image411</image:caption><image:title>image411</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-7.png</image:loc><image:caption>image67</image:caption><image:title>image67</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-4.png</image:loc><image:caption>image204</image:caption><image:title>image204</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image44.png</image:loc><image:caption>image44</image:caption><image:title>image44</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-8.png</image:loc><image:caption>image48</image:caption><image:title>image48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-18.png</image:loc><image:caption>image118</image:caption><image:title>image118</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image28-1.png</image:loc><image:caption>image281</image:caption><image:title>image281</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(18).png</image:loc><image:caption>BLOGImagesTemplatev218</image:caption><image:title>BLOGImagesTemplatev218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-7.png</image:loc><image:caption>image97</image:caption><image:title>image97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-4.png</image:loc><image:caption>image194</image:caption><image:title>image194</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-6.png</image:loc><image:caption>image116</image:caption><image:title>image116</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-7.png</image:loc><image:caption>image107</image:caption><image:title>image107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-4.png</image:loc><image:caption>image184</image:caption><image:title>image184</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image49.png</image:loc><image:caption>image49</image:caption><image:title>image49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-7.png</image:loc><image:caption>image127</image:caption><image:title>image127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-10.png</image:loc><image:caption>image810</image:caption><image:title>image810</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image50.png</image:loc><image:caption>image50</image:caption><image:title>image50</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-3.png</image:loc><image:caption>image213</image:caption><image:title>image213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-10.png</image:loc><image:caption>image510</image:caption><image:title>image510</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image35-1.png</image:loc><image:caption>image351</image:caption><image:title>image351</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image37.png</image:loc><image:caption>image37</image:caption><image:title>image37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-14.png</image:loc><image:caption>image214</image:caption><image:title>image214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-11.png</image:loc><image:caption>image311</image:caption><image:title>image311</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-5.png</image:loc><image:caption>image175</image:caption><image:title>image175</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image48.png</image:loc><image:caption>image48</image:caption><image:title>image48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-8.png</image:loc><image:caption>image78</image:caption><image:title>image78</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image22-2.png</image:loc><image:caption>image222</image:caption><image:title>image222</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image30.png</image:loc><image:caption>image30</image:caption><image:title>image30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image40-1.png</image:loc><image:caption>image401</image:caption><image:title>image401</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-8.png</image:loc><image:caption>image138</image:caption><image:title>image138</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image36-1.png</image:loc><image:caption>image361</image:caption><image:title>image361</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image38.png</image:loc><image:caption>image38</image:caption><image:title>image38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image31-1.png</image:loc><image:caption>image311</image:caption><image:title>image311</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-847334548.jpg</image:loc><image:caption>GettyImages847334548</image:caption><image:title>GettyImages847334548</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-8.png</image:loc><image:caption>image148</image:caption><image:title>image148</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27-1.png</image:loc><image:caption>image271</image:caption><image:title>image271</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-3.png</image:loc><image:caption>image243</image:caption><image:title>image243</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image32-1.png</image:loc><image:caption>image321</image:caption><image:title>image321</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image26.png</image:loc><image:caption>image26</image:caption><image:title>image26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image29.png</image:loc><image:caption>image29</image:caption><image:title>image29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image46.png</image:loc><image:caption>image46</image:caption><image:title>image46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image33-2.png</image:loc><image:caption>image332</image:caption><image:title>image332</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-4.png</image:loc><image:caption>image164</image:caption><image:title>image164</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image39.png</image:loc><image:caption>image39</image:caption><image:title>image39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-7.png</image:loc><image:caption>image157</image:caption><image:title>image157</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image43-1.png</image:loc><image:caption>image431</image:caption><image:title>image431</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image25.png</image:loc><image:caption>image25</image:caption><image:title>image25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image42.png</image:loc><image:caption>image42</image:caption><image:title>image42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image47.png</image:loc><image:caption>image47</image:caption><image:title>image47</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/stealthy-cybereason-emerges-with-4.6m-series-a-to-protect-against-malicious-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/privet_equity_dow_jones.jpg</image:loc><image:caption>privetequitydowjones</image:caption><image:title>privetequitydowjones</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-april-7th-2021-mitre-attck-evaluations-explained</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-15T100357.052.png</image:loc><image:caption>blogposttext20220815T100357052</image:caption><image:title>blogposttext20220815T100357052</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cody%20Queen.png</image:loc><image:caption>CodyQueen</image:caption><image:title>CodyQueen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-should-you-pay-ransomware-attackers-a-game-theory-approach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(6).png</image:loc><image:caption>Maliciouslifepodcast6</image:caption><image:title>Maliciouslifepodcast6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Jingguo-Wang.jpg</image:loc><image:caption>JingguoWang</image:caption><image:title>JingguoWang</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-226-Card.png</image:loc><image:caption>MLEp226Card</image:caption><image:title>MLEp226Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Kay-Yut-Chen.jpg</image:loc><image:caption>KayYutChen</image:caption><image:title>KayYutChen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-237-card.png</image:loc><image:caption>mlep237card</image:caption><image:title>mlep237card</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/why-cheap-security-cameras-arent-secure-at-all</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/tgu_pic.jpg</image:loc><image:caption>tgupic</image:caption><image:title>tgupic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2017-12-20</lastmod></url><url><loc>https://www.cybereason.com/blog/the-difference-between-endpoint-detection-and-response-sandbox-and-containerization-solutions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_214476049.jpg</image:loc><image:caption>shutterstock214476049</image:caption><image:title>shutterstock214476049</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blank-avatar.png</image:loc><image:caption>blankavatar</image:caption><image:title>blankavatar</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-06-13</lastmod></url><url><loc>https://www.cybereason.com/protecting-insurance-industry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/platform-bg-shape-sm.png</image:loc><image:caption>platformbgshapesm</image:caption><image:title>platformbgshapesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/full-background.png</image:loc><image:caption>fullbackground</image:caption><image:title>fullbackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/play%20button.png</image:loc><image:caption>playbutton</image:caption><image:title>playbutton</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gray-bg.jpg</image:loc><image:caption>graybg</image:caption><image:title>graybg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/video-background.jpg</image:loc><image:caption>videobackground</image:caption><image:title>videobackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Insurance%20-%20hero%20image.png</image:loc><image:caption>Insuranceheroimage</image:caption><image:title>Insuranceheroimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-to-protect-your-organization-from-ransomware-attacks-during-the-holiday-season</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo-Nov-18-2021-02-15-56-40-AM.png</image:loc><image:caption>TechRepubliclogoNov18202102155640AM</image:caption><image:title>TechRepubliclogoNov18202102155640AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-11-18</lastmod></url><url><loc>https://www.cybereason.com/blog</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/private-infrastructure-protection-version-21-2.mp4/medium.jpg</video:thumbnail_loc><video:title>private-infrastructure-protection-version-21-2</video:title><video:description>private-infrastructure-protection-version-21-2</video:description><video:content_loc>https://www.cybereason.com/hubfs/private-infrastructure-protection-version-21-2.mp4</video:content_loc><video:duration>292</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(19).png</image:loc><image:caption>BLOGImagesTemplatev219</image:caption><image:title>BLOGImagesTemplatev219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/variant-payload-prevention.png</image:loc><image:caption>variantpayloadprevention</image:caption><image:title>variantpayloadprevention</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-1.png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20to%20Not%20Build%20a%20Cybersecurity%20Startup-1.png</image:loc><image:caption>HowtoNotBuildaCybersecurityStartup1</image:caption><image:title>HowtoNotBuildaCybersecurityStartup1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-251-featured.png</image:loc><image:caption>MLEp251featured</image:caption><image:title>MLEp251featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(18).png</image:loc><image:caption>BLOGImagesTemplatev218</image:caption><image:title>BLOGImagesTemplatev218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(2).png</image:loc><image:caption>BLOGImagesTemplatev22</image:caption><image:title>BLOGImagesTemplatev22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1)-1.png</image:loc><image:caption>BLOGPOST11</image:caption><image:title>BLOGPOST11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-vs-cloud-blog.png</image:loc><image:caption>onpremvscloudblog</image:caption><image:title>onpremvscloudblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-226-Card.png</image:loc><image:caption>MLEp226Card</image:caption><image:title>MLEp226Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/soc-modernization-blog-featured.png</image:loc><image:caption>socmodernizationblogfeatured</image:caption><image:title>socmodernizationblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(5).png</image:loc><image:caption>BLOGImagesTemplatev25</image:caption><image:title>BLOGImagesTemplatev25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Tycoon%20Phishing%20Kit/BLOG_Images_Template_v2%20(27).png</image:loc><image:caption>BLOGImagesTemplatev227</image:caption><image:title>BLOGImagesTemplatev227</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/threat-analysis-lnk-files-featured-image.png</image:loc><image:caption>threatanalysislnkfilesfeaturedimage</image:caption><image:title>threatanalysislnkfilesfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T112617.289.png</image:loc><image:caption>blogposttext20221003T112617289</image:caption><image:title>blogposttext20221003T112617289</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/activemq-blog-featured.png</image:loc><image:caption>activemqblogfeatured</image:caption><image:title>activemqblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(41).png</image:loc><image:caption>blogposttext41</image:caption><image:title>blogposttext41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-233-Card.png</image:loc><image:caption>MLEp233Card</image:caption><image:title>MLEp233Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-DJvu-variant-featured-image.png</image:loc><image:caption>threatalertDJvuvariantfeaturedimage</image:caption><image:title>threatalertDJvuvariantfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/darkgate-featured.png</image:loc><image:caption>darkgatefeatured</image:caption><image:title>darkgatefeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085148.693.png</image:loc><image:caption>blogposttext20221018T085148693</image:caption><image:title>blogposttext20221018T085148693</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Cybersecurity-Capability-Industry-Nearly-Forgot.png</image:loc><image:caption>CybersecurityCapabilityIndustryNearlyForgot</image:caption><image:title>CybersecurityCapabilityIndustryNearlyForgot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/From%20Scripts%20to%20Systems-%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations/BLOG_Images_Template_v2%20(28).png</image:loc><image:caption>BLOGImagesTemplatev228</image:caption><image:title>BLOGImagesTemplatev228</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113218.959.png</image:loc><image:caption>blogposttext20220920T113218959</image:caption><image:title>blogposttext20220920T113218959</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-Jan-09-2023-06-47-00-9221-PM.png</image:loc><image:caption>blogposttextJan0920230647009221PM</image:caption><image:title>blogposttextJan0920230647009221PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Black%20Basta%20Threat%20Alert.png</image:loc><image:caption>BlackBastaThreatAlert</image:caption><image:title>BlackBastaThreatAlert</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/olist-cybereason-mdr.png</image:loc><image:caption>olistcybereasonmdr</image:caption><image:title>olistcybereasonmdr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-244-Card.png</image:loc><image:caption>MLEp244Card</image:caption><image:title>MLEp244Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xy-backdoor-blog-featured.png</image:loc><image:caption>xybackdoorblogfeatured</image:caption><image:title>xybackdoorblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q4_2025/BLOG_Images_Template_v2%20(38).png</image:loc><image:caption>BLOGImagesTemplatev238</image:caption><image:title>BLOGImagesTemplatev238</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-29T100914.455.png</image:loc><image:caption>blogposttext20220929T100914455</image:caption><image:title>blogposttext20220929T100914455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/epp-changing-of-the-guard-blog-featured.png</image:loc><image:caption>eppchangingoftheguardblogfeatured</image:caption><image:title>eppchangingoftheguardblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(112).png</image:loc><image:caption>blogposttext112</image:caption><image:title>blogposttext112</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1).png</image:loc><image:caption>BLOGPOST1</image:caption><image:title>BLOGPOST1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Russian%20Business%20Network.png</image:loc><image:caption>TheRussianBusinessNetwork</image:caption><image:title>TheRussianBusinessNetwork</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Royal%20Ransomware-1.png</image:loc><image:caption>RoyalRansomware1</image:caption><image:title>RoyalRansomware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T072637.791.png</image:loc><image:caption>blogposttext20221005T072637791</image:caption><image:title>blogposttext20221005T072637791</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-15T085736.357.png</image:loc><image:caption>blogposttext20220915T085736357</image:caption><image:title>blogposttext20220915T085736357</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(13).png</image:loc><image:caption>BLOGImagesTemplatev213</image:caption><image:title>BLOGImagesTemplatev213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/bug-bounty-programs-ep-221.png</image:loc><image:caption>bugbountyprogramsep221</image:caption><image:title>bugbountyprogramsep221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/operation-ivy-bells-ep-208.png</image:loc><image:caption>operationivybellsep208</image:caption><image:title>operationivybellsep208</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T072538.395.png</image:loc><image:caption>blogposttext20220920T072538395</image:caption><image:title>blogposttext20220920T072538395</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_SonicWall.png</image:loc><image:caption>BLOGImagesSonicWall</image:caption><image:title>BLOGImagesSonicWall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason-private-infrastructure-protection-gartner-magic-quadrant.png</image:loc><image:caption>Cybereasonprivateinfrastructureprotectiongartnermagicquadrant</image:caption><image:title>Cybereasonprivateinfrastructureprotectiongartnermagicquadrant</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8481.png</image:loc><image:caption>IMG8481</image:caption><image:title>IMG8481</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/smartest-cybersecurity-minds-2024-blog-featured.png</image:loc><image:caption>smartestcybersecurityminds2024blogfeatured</image:caption><image:title>smartestcybersecurityminds2024blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(31).png</image:loc><image:caption>MaliciousLifeepisode31</image:caption><image:title>MaliciousLifeepisode31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20Ransomware%20is%20Driving%20SOC%20Modernization%20Requirements.png</image:loc><image:caption>HowRansomwareisDrivingSOCModernizationRequirements</image:caption><image:title>HowRansomwareisDrivingSOCModernizationRequirements</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-part-1-analysis-blog-analysis-featured.png</image:loc><image:caption>cuckoospearpart1analysisbloganalysisfeatured</image:caption><image:title>cuckoospearpart1analysisbloganalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cloud-detection-sysdig-featured-image.png</image:loc><image:caption>clouddetectionsysdigfeaturedimage</image:caption><image:title>clouddetectionsysdigfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(8).png</image:loc><image:caption>BLOGImagesTemplatev28</image:caption><image:title>BLOGImagesTemplatev28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20advances%20prevention%20data%20collection.png</image:loc><image:caption>Cybereasonadvancespreventiondatacollection</image:caption><image:title>Cybereasonadvancespreventiondatacollection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware-shifting-to-cloud.png</image:loc><image:caption>Ransomwareshiftingtocloud</image:caption><image:title>Ransomwareshiftingtocloud</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Future%20SOC%20Effectiveness.png</image:loc><image:caption>FutureSOCEffectiveness</image:caption><image:title>FutureSOCEffectiveness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202025-01-17%20at%203.25.26%20PM.png</image:loc><image:caption>Screenshot20250117at32526PM</image:caption><image:title>Screenshot20250117at32526PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/russian-fake-news-explained-mlbside-ep-209.png</image:loc><image:caption>russianfakenewsexplainedmlbsideep209</image:caption><image:title>russianfakenewsexplainedmlbsideep209</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/machine-timeline-enhancements.png</image:loc><image:caption>machinetimelineenhancements</image:caption><image:title>machinetimelineenhancements</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(7).png</image:loc><image:caption>BLOGImagesTemplatev27</image:caption><image:title>BLOGImagesTemplatev27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV-redefined-blog-post-text.png</image:loc><image:caption>NGAVredefinedblogposttext</image:caption><image:title>NGAVredefinedblogposttext</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xdr-castle-sky-blog.png</image:loc><image:caption>xdrcastleskyblog</image:caption><image:title>xdrcastleskyblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-announcement-blog-featured.png</image:loc><image:caption>onpremannouncementblogfeatured</image:caption><image:title>onpremannouncementblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RSA%20Conference.png</image:loc><image:caption>RSAConference</image:caption><image:title>RSAConference</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(2)-1.png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/anydesk-breach-blog-featured.png</image:loc><image:caption>anydeskbreachblogfeatured</image:caption><image:title>anydeskbreachblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/other-problem-with-nfts-ep-206.png</image:loc><image:caption>otherproblemwithnftsep206</image:caption><image:title>otherproblemwithnftsep206</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(36).png</image:loc><image:caption>BLOGImagesTemplatev236</image:caption><image:title>BLOGImagesTemplatev236</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T125306.964.png</image:loc><image:caption>blogposttext20221003T125306964</image:caption><image:title>blogposttext20221003T125306964</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(32).png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-248-Card.png</image:loc><image:caption>MLEp248Card</image:caption><image:title>MLEp248Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FBI-CISA-Cuba-Ransomware.png</image:loc><image:caption>FBICISACubaRansomware</image:caption><image:title>FBICISACubaRansomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T065715.064.png</image:loc><image:caption>blogposttext20221006T065715064</image:caption><image:title>blogposttext20221006T065715064</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(16).png</image:loc><image:caption>BLOGImagesTemplatev216</image:caption><image:title>BLOGImagesTemplatev216</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cybereason-sdr-evolution-blog-featured-2.png</image:loc><image:caption>cybereasonsdrevolutionblogfeatured2</image:caption><image:title>cybereasonsdrevolutionblogfeatured2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4)-1.png</image:loc><image:caption>MaliciousLifeepisode41</image:caption><image:title>MaliciousLifeepisode41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-ai.png</image:loc><image:caption>cybereasonxdrai</image:caption><image:title>cybereasonxdrai</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(17).png</image:loc><image:caption>BLOGImagesTemplatev217</image:caption><image:title>BLOGImagesTemplatev217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/TheGentlemen/The%20Gentlemen%20Blog.png</image:loc><image:caption>TheGentlemenBlog</image:caption><image:title>TheGentlemenBlog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jailbreaking%20Tractors-1.png</image:loc><image:caption>JailbreakingTractors1</image:caption><image:title>JailbreakingTractors1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-234-card.png</image:loc><image:caption>mlep234card</image:caption><image:title>mlep234card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-mitre-23-lp-featured-1.png</image:loc><image:caption>crmitre23lpfeatured1</image:caption><image:title>crmitre23lpfeatured1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-inc-ransomware-featured-image.png</image:loc><image:caption>threatalertincransomwarefeaturedimage</image:caption><image:title>threatalertincransomwarefeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-229-Card.png</image:loc><image:caption>MLEp229Card</image:caption><image:title>MLEp229Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/the%20problem%20with%20kernel%20mode%20anti%20cheat%20software-1.png</image:loc><image:caption>theproblemwithkernelmodeanticheatsoftware1</image:caption><image:title>theproblemwithkernelmodeanticheatsoftware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/youtube-malware-blog-featured.png</image:loc><image:caption>youtubemalwareblogfeatured</image:caption><image:title>youtubemalwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T113003.246.png</image:loc><image:caption>blogposttext20221003T113003246</image:caption><image:title>blogposttext20221003T113003246</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(1).png</image:loc><image:caption>BLOGImagesTemplatev21</image:caption><image:title>BLOGImagesTemplatev21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-232-Card.png</image:loc><image:caption>MLEp232Card</image:caption><image:title>MLEp232Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-19T122257.609.png</image:loc><image:caption>blogposttext20220919T122257609</image:caption><image:title>blogposttext20220919T122257609</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/how-countries-can-lose-the-internet-ep-213.png</image:loc><image:caption>howcountriescanlosetheinternetep213</image:caption><image:title>howcountriescanlosetheinternetep213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Stellar-Discovery_v2.png</image:loc><image:caption>BLOGStellarDiscoveryv2</image:caption><image:title>BLOGStellarDiscoveryv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5)-1.png</image:loc><image:caption>MaliciousLifeepisode51</image:caption><image:title>MaliciousLifeepisode51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/hardbit-threat-analysis-featured.png</image:loc><image:caption>hardbitthreatanalysisfeatured</image:caption><image:title>hardbitthreatanalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(30).png</image:loc><image:caption>MaliciousLifeepisode30</image:caption><image:title>MaliciousLifeepisode30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(3)-2.png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-rsa-conference-2023.png</image:loc><image:caption>cybereasonrsaconference2023</image:caption><image:title>cybereasonrsaconference2023</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/keeping%20up%20with%20ai%20innovation%20blog%20img.png</image:loc><image:caption>keepingupwithaiinnovationblogimg</image:caption><image:title>keepingupwithaiinnovationblogimg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sliver%20C2-1.png</image:loc><image:caption>SliverC21</image:caption><image:title>SliverC21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(37).png</image:loc><image:caption>BLOGImagesTemplatev237</image:caption><image:title>BLOGImagesTemplatev237</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(124).png</image:loc><image:caption>blogposttext124</image:caption><image:title>blogposttext124</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T071527.904.png</image:loc><image:caption>blogposttext20221006T071527904</image:caption><image:title>blogposttext20221006T071527904</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware%20Which%20Industries%20Are%20Most%20Likely%20to%20Pay-1.png</image:loc><image:caption>RansomwareWhichIndustriesAreMostLikelytoPay1</image:caption><image:title>RansomwareWhichIndustriesAreMostLikelytoPay1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lockbit-3-blog-card.png</image:loc><image:caption>lockbit3blogcard</image:caption><image:title>lockbit3blogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T134316.545.png</image:loc><image:caption>blogposttext20220914T134316545</image:caption><image:title>blogposttext20220914T134316545</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/exdr-buyers-guide-23-blog-featured.png</image:loc><image:caption>exdrbuyersguide23blogfeatured</image:caption><image:title>exdrbuyersguide23blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(15).png</image:loc><image:caption>BLOGImagesTemplatev215</image:caption><image:title>BLOGImagesTemplatev215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T103718.231.png</image:loc><image:caption>blogposttext20220914T103718231</image:caption><image:title>blogposttext20220914T103718231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-Jan-06-2023-11-40-30-7591-PM.png</image:loc><image:caption>blogposttextJan0620231140307591PM</image:caption><image:title>blogposttextJan0620231140307591PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/sony-bmg-rootkit-ep-218.png</image:loc><image:caption>sonybmgrootkitep218</image:caption><image:title>sonybmgrootkitep218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(29).png</image:loc><image:caption>MaliciousLifeepisode29</image:caption><image:title>MaliciousLifeepisode29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(1)-1.png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/capability-vs-usability-blog-featured.png</image:loc><image:caption>capabilityvsusabilityblogfeatured</image:caption><image:title>capabilityvsusabilityblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-pt-2-featured.png</image:loc><image:caption>cuckoospearpt2featured</image:caption><image:title>cuckoospearpt2featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jamie-Blog-Predictions.jpg</image:loc><image:caption>JamieBlogPredictions</image:caption><image:title>JamieBlogPredictions</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-241-Card.png</image:loc><image:caption>MLEp241Card</image:caption><image:title>MLEp241Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(24).png</image:loc><image:caption>BLOGImagesTemplatev224</image:caption><image:title>BLOGImagesTemplatev224</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/2024-Cybersecurity-Predictions%20-%20Generative-GD-Featured.png</image:loc><image:caption>2024CybersecurityPredictionsGenerativeGDFeatured</image:caption><image:title>2024CybersecurityPredictionsGenerativeGDFeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2023%20Cybersecurity%20Predictions.png</image:loc><image:caption>2023CybersecurityPredictions</image:caption><image:title>2023CybersecurityPredictions</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T082054.921.png</image:loc><image:caption>blogposttext20221003T082054921</image:caption><image:title>blogposttext20221003T082054921</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Biden-cybersecurity-strategy.png</image:loc><image:caption>Bidencybersecuritystrategy</image:caption><image:title>Bidencybersecuritystrategy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/eu-network-information-security-blog-featured.png</image:loc><image:caption>eunetworkinformationsecurityblogfeatured</image:caption><image:title>eunetworkinformationsecurityblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/citrixbleed-featured-image.png</image:loc><image:caption>citrixbleedfeaturedimage</image:caption><image:title>citrixbleedfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-237-card.png</image:loc><image:caption>mlep237card</image:caption><image:title>mlep237card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-224-Card.png</image:loc><image:caption>MLEp224Card</image:caption><image:title>MLEp224Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-236-card.png</image:loc><image:caption>mlep236card</image:caption><image:title>mlep236card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/alert-fatigue-the-silent-epidemic-featured-blog.png</image:loc><image:caption>alertfatiguethesilentepidemicfeaturedblog</image:caption><image:title>alertfatiguethesilentepidemicfeaturedblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/reason-you-dont-have-data-privacy-ep-214.png</image:loc><image:caption>reasonyoudonthavedataprivacyep214</image:caption><image:title>reasonyoudonthavedataprivacyep214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-28T090319.905.png</image:loc><image:caption>blogposttext20220928T090319905</image:caption><image:title>blogposttext20220928T090319905</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE%202024%20CYBEREASON.png</image:loc><image:caption>MITRE2024CYBEREASON</image:caption><image:title>MITRE2024CYBEREASON</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q3%202025/Untitled%20presentation%20(3).png</image:loc><image:caption>Untitledpresentation3</image:caption><image:title>Untitledpresentation3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Healthcare%20CISOs%20Can%20Do%20Differently%20Ransomware-1.png</image:loc><image:caption>WhatHealthcareCISOsCanDoDifferentlyRansomware1</image:caption><image:title>WhatHealthcareCISOsCanDoDifferentlyRansomware1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-11T064615.861.png</image:loc><image:caption>blogposttext20221011T064615861</image:caption><image:title>blogposttext20221011T064615861</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-29T075130.403.png</image:loc><image:caption>blogposttext20220929T075130403</image:caption><image:title>blogposttext20220929T075130403</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/goot-loader-blog-featured.png</image:loc><image:caption>gootloaderblogfeatured</image:caption><image:title>gootloaderblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T131959.309.png</image:loc><image:caption>blogposttext20220926T131959309</image:caption><image:title>blogposttext20220926T131959309</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2022%20Holiday%20Ransomware%20Study.png</image:loc><image:caption>2022HolidayRansomwareStudy</image:caption><image:title>2022HolidayRansomwareStudy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSI%20Masquerading%20as%20a%20Malicious%20Software%20Installer%20blog.png</image:loc><image:caption>MSIMasqueradingasaMaliciousSoftwareInstallerblog</image:caption><image:title>MSIMasqueradingasaMaliciousSoftwareInstallerblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v4_Page_1.png</image:loc><image:caption>BLOGImagesTemplatev4Page1</image:caption><image:title>BLOGImagesTemplatev4Page1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Mitre%20Blog%202026.png</image:loc><image:caption>CybereasonMitreBlog2026</image:caption><image:title>CybereasonMitreBlog2026</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(28).png</image:loc><image:caption>MaliciousLifeepisode28</image:caption><image:title>MaliciousLifeepisode28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ad-fraud-pt2-ep-217.png</image:loc><image:caption>adfraudpt2ep217</image:caption><image:title>adfraudpt2ep217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/generative-ai-dangerous-ep-222.png</image:loc><image:caption>generativeaidangerousep222</image:caption><image:title>generativeaidangerousep222</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Can%20Chess%20Grandmasters%20Teach%20Us.png</image:loc><image:caption>WhatCanChessGrandmastersTeachUs</image:caption><image:title>WhatCanChessGrandmastersTeachUs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/snake-python-infostealer-blog-featured.png</image:loc><image:caption>snakepythoninfostealerblogfeatured</image:caption><image:title>snakepythoninfostealerblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-242-Card.png</image:loc><image:caption>MLEp242Card</image:caption><image:title>MLEp242Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-225-Card.png</image:loc><image:caption>MLEp225Card</image:caption><image:title>MLEp225Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(9).png</image:loc><image:caption>BLOGImagesTemplatev29</image:caption><image:title>BLOGImagesTemplatev29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ML-Ep-249-featured.png</image:loc><image:caption>MLEp249featured</image:caption><image:title>MLEp249featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130836.455.png</image:loc><image:caption>blogposttext20220926T130836455</image:caption><image:title>blogposttext20220926T130836455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jamie-Blog-Predictions-1.jpg</image:loc><image:caption>JamieBlogPredictions1</image:caption><image:title>JamieBlogPredictions1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chrome%20Extension%20Campaign.png</image:loc><image:caption>ChromeExtensionCampaign</image:caption><image:title>ChromeExtensionCampaign</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/soc-dash-23-ram-featured-image.png</image:loc><image:caption>socdash23ramfeaturedimage</image:caption><image:title>socdash23ramfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/beast-ransomware-blog-featured.png</image:loc><image:caption>beastransomwareblogfeatured</image:caption><image:title>beastransomwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-12T072834.369-1.png</image:loc><image:caption>blogposttext20221012T0728343691</image:caption><image:title>blogposttext20221012T0728343691</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR-TOP-11-CONTROLS-web-images-BLOG-Opt.3-V02.png</image:loc><image:caption>CRTOP11CONTROLSwebimagesBLOGOpt3V02</image:caption><image:title>CRTOP11CONTROLSwebimagesBLOGOpt3V02</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-data-management.png</image:loc><image:caption>cybereasonxdrdatamanagement</image:caption><image:title>cybereasonxdrdatamanagement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-thamar-reservoir.png</image:loc><image:caption>MaliciousLifeepisodethamarreservoir</image:caption><image:title>MaliciousLifeepisodethamarreservoir</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(14).png</image:loc><image:caption>BLOGImagesTemplatev214</image:caption><image:title>BLOGImagesTemplatev214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-223-Card.png</image:loc><image:caption>MLEp223Card</image:caption><image:title>MLEp223Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113510.582.png</image:loc><image:caption>blogposttext20220920T113510582</image:caption><image:title>blogposttext20220920T113510582</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ivanti-threat-alert-blog-featured.png</image:loc><image:caption>ivantithreatalertblogfeatured</image:caption><image:title>ivantithreatalertblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/behind-closed-doors-rise-of-remote-access-featured.png</image:loc><image:caption>behindcloseddoorsriseofremoteaccessfeatured</image:caption><image:title>behindcloseddoorsriseofremoteaccessfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-239-Card.png</image:loc><image:caption>MLEp239Card</image:caption><image:title>MLEp239Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat-Alert-GootLoader-SEO-Poisoning.png</image:loc><image:caption>ThreatAlertGootLoaderSEOPoisoning</image:caption><image:title>ThreatAlertGootLoaderSEOPoisoning</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-malicious-life-blog-home--featured.jpg</image:loc><image:caption>crmaliciouslifebloghomefeatured</image:caption><image:title>crmaliciouslifebloghomefeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/economics-of-cybersecurity-ep-215.png</image:loc><image:caption>economicsofcybersecurityep215</image:caption><image:title>economicsofcybersecurityep215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ai-potential-cybersecurity-featured.png</image:loc><image:caption>aipotentialcybersecurityfeatured</image:caption><image:title>aipotentialcybersecurityfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-245-Card.png</image:loc><image:caption>MLEp245Card</image:caption><image:title>MLEp245Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-247-Card.png</image:loc><image:caption>MLEp247Card</image:caption><image:title>MLEp247Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog%20img%20lummastealer-1.png</image:loc><image:caption>blogimglummastealer1</image:caption><image:title>blogimglummastealer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2025%20PREDICTIONS%20BY%20GREG%20DAY.jpg</image:loc><image:caption>2025PREDICTIONSBYGREGDAY</image:caption><image:title>2025PREDICTIONSBYGREGDAY</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(27).png</image:loc><image:caption>BLOGImagesTemplatev227</image:caption><image:title>BLOGImagesTemplatev227</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/nfts-disappear-mlbside-ep-207.png</image:loc><image:caption>nftsdisappearmlbsideep207</image:caption><image:title>nftsdisappearmlbsideep207</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt1-ep-210.png</image:loc><image:caption>lawrenceberkelehackpt1ep210</image:caption><image:title>lawrenceberkelehackpt1ep210</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(23).png</image:loc><image:caption>BLOGImagesTemplatev223</image:caption><image:title>BLOGImagesTemplatev223</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-252-featured.png</image:loc><image:caption>MLEp252featured</image:caption><image:title>MLEp252featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ad-fraud-pt1-ep-217.png</image:loc><image:caption>adfraudpt1ep217</image:caption><image:title>adfraudpt1ep217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Podcast%20LabMD%20vs%20FTC.png</image:loc><image:caption>MaliciousLifePodcastLabMDvsFTC</image:caption><image:title>MaliciousLifePodcastLabMDvsFTC</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/bridging-th-gap-blog-featured.png</image:loc><image:caption>bridgingthgapblogfeatured</image:caption><image:title>bridgingthgapblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/5%20steps%20to%20more%20effective%20ransomware%20response.png</image:loc><image:caption>5stepstomoreeffectiveransomwareresponse</image:caption><image:title>5stepstomoreeffectiveransomwareresponse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(11).png</image:loc><image:caption>BLOGImagesTemplatev211</image:caption><image:title>BLOGImagesTemplatev211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Would%20Happen%20if%20CBS%20Got%20Hacked.png</image:loc><image:caption>WhatWouldHappenifCBSGotHacked</image:caption><image:title>WhatWouldHappenifCBSGotHacked</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/7-requirements-for-xdr.png</image:loc><image:caption>7requirementsforxdr</image:caption><image:title>7requirementsforxdr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-246-Card.png</image:loc><image:caption>MLEp246Card</image:caption><image:title>MLEp246Card</image:title></image:image><lastmod>2023-08-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-to-know-about-darkside-the-hacking-group-responsible-for-colonial-pipeline-cyberattack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Washington%20Examiner%20logo.png</image:loc><image:caption>WashingtonExaminerlogo</image:caption><image:title>WashingtonExaminerlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-executives-abigail-maines-and-stephan-tallent-named-2022-crn-channel-chiefs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/blog/everything-cybereason-at-the-2022-rsa-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(120).png</image:loc><image:caption>blogposttext120</image:caption><image:title>blogposttext120</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Apr-13-2022-06-37-26-24-PM.png</image:loc><image:caption>CaptureApr13202206372624PM</image:caption><image:title>CaptureApr13202206372624PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(78).png</image:loc><image:caption>blogposttext78</image:caption><image:title>blogposttext78</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-rsa-conference-2023.png</image:loc><image:caption>cybereasonrsaconference2023</image:caption><image:title>cybereasonrsaconference2023</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-04-13</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-joins-ibm-security-app-exchange-community</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-are-using-botnets-to-take-the-hard-work-out-of-breaking-into-networks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zdnet.png</image:loc><image:caption>zdnet</image:caption><image:title>zdnet</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-deadringer-exposing-chinese-threat-actors-targeting-major-telcos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085148.693.png</image:loc><image:caption>blogposttext20221018T085148693</image:caption><image:title>blogposttext20221018T085148693</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1).png</image:loc><image:caption>BLOGPOST1</image:caption><image:title>BLOGPOST1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture%20(2)-1.png</image:loc><image:caption>Capture21</image:caption><image:title>Capture21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(9)-1.png</image:loc><image:caption>pastedimage091</image:caption><image:title>pastedimage091</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/deadringer-social-01%20(1).png</image:loc><image:caption>deadringersocial011</image:caption><image:title>deadringersocial011</image:title></image:image><lastmod>2024-08-26</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-publishes-its-first-threat-insights-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-28</lastmod></url><url><loc>https://www.cybereason.com/blog/emotet-botnet-infrastructure-disrupted-in-international-takedown</loc><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T141451.987.png</image:loc><image:caption>blogposttext20220725T141451987</image:caption><image:title>blogposttext20220725T141451987</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Emotet%20Takedown.png</image:loc><image:caption>EmotetTakedown</image:caption><image:title>EmotetTakedown</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/spain-breaks-up-cybercrime-gang-after-1.2-billion-spree</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Associated_Press_logo-1.png</image:loc><image:caption>AssociatedPresslogo1</image:caption><image:title>AssociatedPresslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-03-26</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-ciso-tips-balancing-the-hero-with-the-storyteller</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-60.jpg</image:loc><image:caption>Untitleddesign60</image:caption><image:title>Untitleddesign60</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(4).png</image:loc><image:caption>CISOStoriespodcast4</image:caption><image:title>CISOStoriespodcast4</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-launches-pay-as-you-grow-program-to-nurture-managed-security-services-partners</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/PAYG.png</image:loc><image:caption>PAYG</image:caption><image:title>PAYG</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(17)-1.png</image:loc><image:caption>CybereasonBlogTemplate171</image:caption><image:title>CybereasonBlogTemplate171</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template%20(1).png</image:loc><image:caption>CybereasonBlogHeroTemplate1</image:caption><image:title>CybereasonBlogHeroTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-07-08</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-inside-operation-cuckoobees</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(8).png</image:loc><image:caption>MaliciousLifeepisode8</image:caption><image:title>MaliciousLifeepisode8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/assaf.jpg</image:loc><image:caption>assaf</image:caption><image:title>assaf</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(4).png</image:loc><image:caption>Maliciouslifepodcast4</image:caption><image:title>Maliciouslifepodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2024-08-26</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-introduces-new-pay-as-you-grow-program-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eChannel%20News%20logo.png</image:loc><image:caption>eChannelNewslogo</image:caption><image:title>eChannelNewslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-02-03</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-report-from-shatak-emails-to-the-conti-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16.jpg</image:loc><image:caption>image16</image:caption><image:title>image16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Nov-09-2021-05-45-39-06-PM.png</image:loc><image:caption>image4Nov09202105453906PM</image:caption><image:title>image4Nov09202105453906PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Nov-09-2021-05-43-38-72-PM.png</image:loc><image:caption>image3Nov09202105433872PM</image:caption><image:title>image3Nov09202105433872PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Nov-09-2021-05-37-48-60-PM.png</image:loc><image:caption>image7Nov09202105374860PM</image:caption><image:title>image7Nov09202105374860PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Nov-09-2021-05-38-24-94-PM.png</image:loc><image:caption>image2Nov09202105382494PM</image:caption><image:title>image2Nov09202105382494PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Nov-09-2021-05-34-22-49-PM.png</image:loc><image:caption>image12Nov09202105342249PM</image:caption><image:title>image12Nov09202105342249PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Nov-09-2021-05-35-58-06-PM.png</image:loc><image:caption>image14Nov09202105355806PM</image:caption><image:title>image14Nov09202105355806PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Nov-09-2021-05-45-00-73-PM.png</image:loc><image:caption>image5Nov09202105450073PM</image:caption><image:title>image5Nov09202105450073PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Nov-09-2021-05-39-38-57-PM.png</image:loc><image:caption>image11Nov09202105393857PM</image:caption><image:title>image11Nov09202105393857PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17.jpg</image:loc><image:caption>image17</image:caption><image:title>image17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Nov-09-2021-05-41-28-18-PM.png</image:loc><image:caption>image8Nov09202105412818PM</image:caption><image:title>image8Nov09202105412818PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-Nov-09-2021-05-28-56-22-PM.png</image:loc><image:caption>image19Nov09202105285622PM</image:caption><image:title>image19Nov09202105285622PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9.jpg</image:loc><image:caption>image9</image:caption><image:title>image9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-Nov-09-2021-05-33-24-19-PM.png</image:loc><image:caption>image18Nov09202105332419PM</image:caption><image:title>image18Nov09202105332419PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Nov-09-2021-05-35-09-49-PM.png</image:loc><image:caption>image15Nov09202105350949PM</image:caption><image:title>image15Nov09202105350949PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Nov-09-2021-05-31-21-84-PM.png</image:loc><image:caption>image1Nov09202105312184PM</image:caption><image:title>image1Nov09202105312184PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Feb-08-2022-11-11-24-06-PM-1.jpg</image:loc><image:caption>image11Feb08202211112406PM1</image:caption><image:title>image11Feb08202211112406PM1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Nov-09-2021-05-42-36-26-PM.png</image:loc><image:caption>image6Nov09202105423626PM</image:caption><image:title>image6Nov09202105423626PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Nov-09-2021-05-40-38-88-PM.png</image:loc><image:caption>image10Nov09202105403888PM</image:caption><image:title>image10Nov09202105403888PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Nov-09-2021-05-37-03-43-PM.png</image:loc><image:caption>image13Nov09202105370343PM</image:caption><image:title>image13Nov09202105370343PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-survey-reveals-the-extent-of-ransomware-havoc</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Boulevard%20logo-4.png</image:loc><image:caption>SecurityBoulevardlogo4</image:caption><image:title>SecurityBoulevardlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-06-10</lastmod></url><url><loc>https://www.cybereason.com/careers/customer-success</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blue_concrete.jpg</image:loc><image:caption>blueconcrete</image:caption><image:title>blueconcrete</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/CustomerSuccess-01.jpg</image:loc><image:caption>CustomerSuccess01</image:caption><image:title>CustomerSuccess01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Josh%20Moody-1.png</image:loc><image:caption>UbUSpotlightJoshMoody1</image:caption><image:title>UbUSpotlightJoshMoody1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Danielle%20Wood2.png</image:loc><image:caption>UbUSpotlightDanielleWood2</image:caption><image:title>UbUSpotlightDanielleWood2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Chris%20Black%20lockpicking.jpg</image:loc><image:caption>ChrisBlacklockpicking</image:caption><image:title>ChrisBlacklockpicking</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/play-btn.png</image:loc><image:caption>playbtn</image:caption><image:title>playbtn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Abbey%20Runner.png</image:loc><image:caption>UbUSpotlightAbbeyRunner</image:caption><image:title>UbUSpotlightAbbeyRunner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-continues-rapid-global-expansion-and-outperforms-all-participants-in-recent-mitre-attck-evaluations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-03-13</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-discovers-operation-bearded-barbie-a-new-cyber-espionage-campaign-targeting-high-ranking-defense-and-law-enforcement-officials</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-04-07</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-executive-abigail-maines-named-to-crns-2022-women-of-the-channel-list</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-05-12</lastmod></url><url><loc>https://www.cybereason.com/blog/how-xdr-reduces-the-total-cost-of-security-operations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-18T125623.731.png</image:loc><image:caption>blogposttext20220718T125623731</image:caption><image:title>blogposttext20220718T125623731</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(22).png</image:loc><image:caption>blogposttext22</image:caption><image:title>blogposttext22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-20T113510.582.png</image:loc><image:caption>blogposttext20220920T113510582</image:caption><image:title>blogposttext20220920T113510582</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-09-21</lastmod></url><url><loc>https://www.cybereason.com/blog/cisos-career-large-project-tech-replacement</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(8).png</image:loc><image:caption>CISOStoriespodcast8</image:caption><image:title>CISOStoriespodcast8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_57740119.jpg</image:loc><image:caption>shutterstock57740119</image:caption><image:title>shutterstock57740119</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-08-03</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-sled-security-pandemics-policies-penny-pinching</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO-SLED-blog.png</image:loc><image:caption>CISOSLEDblog</image:caption><image:title>CISOSLEDblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO_51.png</image:loc><image:caption>CISO51</image:caption><image:title>CISO51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-09-21</lastmod></url><url><loc>https://www.cybereason.com/services/active-hunting</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Servicesv3-1.jpg</image:loc><image:caption>Servicesv31</image:caption><image:title>Servicesv31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/platform-bg-shape-sm.png</image:loc><image:caption>platformbgshapesm</image:caption><image:title>platformbgshapesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ServiceSubPageHeader3.png</image:loc><image:caption>ServiceSubPageHeader3</image:caption><image:title>ServiceSubPageHeader3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-01-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hacker-group-releases-stolen-health-records</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Healthinfosecurity.png</image:loc><image:caption>Healthinfosecurity</image:caption><image:title>Healthinfosecurity</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/platform/mobile</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILITY_HUNTING_CR_ICONS-13.svg</image:loc><image:caption>VISIBILITYHUNTINGCRICONS13</image:caption><image:title>VISIBILITYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/TECH_DEEPDIVE_KNOWLEDGE_CR_ICONS-27.svg</image:loc><image:caption>TECHDEEPDIVEKNOWLEDGECRICONS27</image:caption><image:title>TECHDEEPDIVEKNOWLEDGECRICONS27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/mtd-datasheet-2024-cover.png</image:loc><image:caption>mtddatasheet2024cover</image:caption><image:title>mtddatasheet2024cover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/lp-testimonial-second-bg.webp</image:loc><image:caption>lptestimonialsecondbg</image:caption><image:title>lptestimonialsecondbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BUSINESS_PROCESS_CR_ICONS_BATCH_2-19.png</image:loc><image:caption>BUSINESSPROCESSCRICONSBATCH219</image:caption><image:title>BUSINESSPROCESSCRICONSBATCH219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/cr-mtd-ryg-screens-3-row-tall.png</image:loc><image:caption>crmtdrygscreens3rowtall</image:caption><image:title>crmtdrygscreens3rowtall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/cr-mtd-screens-3-row-tall.png</image:loc><image:caption>crmtdscreens3rowtall</image:caption><image:title>crmtdscreens3rowtall</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-macos-malware-steals-bank-log-in-details-and-intellectual-property</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-fixing-the-talent-shortage-cybersecurity-talent-initiative</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Alexander%20Niejelow.png</image:loc><image:caption>AlexanderNiejelow</image:caption><image:title>AlexanderNiejelow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20Template-4.png</image:loc><image:caption>CISOStoriesTemplate4</image:caption><image:title>CISOStoriesTemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO_51.png</image:loc><image:caption>CISO51</image:caption><image:title>CISO51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/blog/sliver-c2-leveraged-by-many-threat-actors</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-1.png</image:loc><image:caption>silverc21</image:caption><image:title>silverc21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-28.png</image:loc><image:caption>silverc228</image:caption><image:title>silverc228</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-27.png</image:loc><image:caption>silverc227</image:caption><image:title>silverc227</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-29.png</image:loc><image:caption>silverc229</image:caption><image:title>silverc229</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-41.png</image:loc><image:caption>silverc241</image:caption><image:title>silverc241</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-45.png</image:loc><image:caption>silverc245</image:caption><image:title>silverc245</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-10.png</image:loc><image:caption>silverc210</image:caption><image:title>silverc210</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-33.png</image:loc><image:caption>silverc233</image:caption><image:title>silverc233</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-54.png</image:loc><image:caption>silverc254</image:caption><image:title>silverc254</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-68.png</image:loc><image:caption>silverc268</image:caption><image:title>silverc268</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-18.png</image:loc><image:caption>silverc218</image:caption><image:title>silverc218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-22.png</image:loc><image:caption>silverc222</image:caption><image:title>silverc222</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-66.png</image:loc><image:caption>silverc266</image:caption><image:title>silverc266</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-25.png</image:loc><image:caption>silverc225</image:caption><image:title>silverc225</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-58.png</image:loc><image:caption>silverc258</image:caption><image:title>silverc258</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-39.png</image:loc><image:caption>silverc239</image:caption><image:title>silverc239</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-56.png</image:loc><image:caption>silverc256</image:caption><image:title>silverc256</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-64.png</image:loc><image:caption>silverc264</image:caption><image:title>silverc264</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-17.png</image:loc><image:caption>silverc217</image:caption><image:title>silverc217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-44.png</image:loc><image:caption>silverc244</image:caption><image:title>silverc244</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-50.png</image:loc><image:caption>silverc250</image:caption><image:title>silverc250</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-5.png</image:loc><image:caption>silverc25</image:caption><image:title>silverc25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-60.png</image:loc><image:caption>silverc260</image:caption><image:title>silverc260</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-3.png</image:loc><image:caption>silverc23</image:caption><image:title>silverc23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-51.png</image:loc><image:caption>silverc251</image:caption><image:title>silverc251</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-23.png</image:loc><image:caption>silverc223</image:caption><image:title>silverc223</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-12.png</image:loc><image:caption>silverc212</image:caption><image:title>silverc212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-7.png</image:loc><image:caption>silverc27</image:caption><image:title>silverc27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-48.png</image:loc><image:caption>silverc248</image:caption><image:title>silverc248</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-65.png</image:loc><image:caption>silverc265</image:caption><image:title>silverc265</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-38.png</image:loc><image:caption>silverc238</image:caption><image:title>silverc238</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-6.png</image:loc><image:caption>silverc26</image:caption><image:title>silverc26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-24.png</image:loc><image:caption>silverc224</image:caption><image:title>silverc224</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-69.png</image:loc><image:caption>silverc269</image:caption><image:title>silverc269</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-meroujan.jpg</image:loc><image:caption>silverc2meroujan</image:caption><image:title>silverc2meroujan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-11.png</image:loc><image:caption>silverc211</image:caption><image:title>silverc211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-34.png</image:loc><image:caption>silverc234</image:caption><image:title>silverc234</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-2.png</image:loc><image:caption>silverc22</image:caption><image:title>silverc22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-Jan-06-2023-11-40-30-7591-PM.png</image:loc><image:caption>blogposttextJan0620231140307591PM</image:caption><image:title>blogposttextJan0620231140307591PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-42.png</image:loc><image:caption>silverc242</image:caption><image:title>silverc242</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-59.png</image:loc><image:caption>silverc259</image:caption><image:title>silverc259</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-19.png</image:loc><image:caption>silverc219</image:caption><image:title>silverc219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-62.png</image:loc><image:caption>silverc262</image:caption><image:title>silverc262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-loic.jpg</image:loc><image:caption>silverc2loic</image:caption><image:title>silverc2loic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-15.png</image:loc><image:caption>silverc215</image:caption><image:title>silverc215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-52.png</image:loc><image:caption>silverc252</image:caption><image:title>silverc252</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-14.png</image:loc><image:caption>silverc214</image:caption><image:title>silverc214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-47.png</image:loc><image:caption>silverc247</image:caption><image:title>silverc247</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-46.png</image:loc><image:caption>silverc246</image:caption><image:title>silverc246</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-13.png</image:loc><image:caption>silverc213</image:caption><image:title>silverc213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-20.png</image:loc><image:caption>silverc220</image:caption><image:title>silverc220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-55.png</image:loc><image:caption>silverc255</image:caption><image:title>silverc255</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-61.png</image:loc><image:caption>silverc261</image:caption><image:title>silverc261</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-8.png</image:loc><image:caption>silverc28</image:caption><image:title>silverc28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-31.png</image:loc><image:caption>silverc231</image:caption><image:title>silverc231</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-40.png</image:loc><image:caption>silverc240</image:caption><image:title>silverc240</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-53.png</image:loc><image:caption>silverc253</image:caption><image:title>silverc253</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-9.png</image:loc><image:caption>silverc29</image:caption><image:title>silverc29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-35.png</image:loc><image:caption>silverc235</image:caption><image:title>silverc235</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-16.png</image:loc><image:caption>silverc216</image:caption><image:title>silverc216</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-36.png</image:loc><image:caption>silverc236</image:caption><image:title>silverc236</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-4.png</image:loc><image:caption>silverc24</image:caption><image:title>silverc24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-57.png</image:loc><image:caption>silverc257</image:caption><image:title>silverc257</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-21.png</image:loc><image:caption>silverc221</image:caption><image:title>silverc221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sliver%20C2-1.png</image:loc><image:caption>SliverC21</image:caption><image:title>SliverC21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-49.png</image:loc><image:caption>silverc249</image:caption><image:title>silverc249</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-32.png</image:loc><image:caption>silverc232</image:caption><image:title>silverc232</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-30.png</image:loc><image:caption>silverc230</image:caption><image:title>silverc230</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-67.png</image:loc><image:caption>silverc267</image:caption><image:title>silverc267</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-43.png</image:loc><image:caption>silverc243</image:caption><image:title>silverc243</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-70.png</image:loc><image:caption>silverc270</image:caption><image:title>silverc270</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-26.png</image:loc><image:caption>silverc226</image:caption><image:title>silverc226</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/silverc2-37.png</image:loc><image:caption>silverc237</image:caption><image:title>silverc237</image:title></image:image><lastmod>2023-09-05</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/maranda-cigna</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/maranda-hs.jpg</image:loc><image:caption>marandahs</image:caption><image:title>marandahs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Blog-Hero-2.jpg</image:loc><image:caption>MITREBlogHero2</image:caption><image:title>MITREBlogHero2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-owl-showcase-preventid-1500px.png</image:loc><image:caption>crowlshowcasepreventid1500px</image:caption><image:title>crowlshowcasepreventid1500px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-mitre-23-lp-featured-1.png</image:loc><image:caption>crmitre23lpfeatured1</image:caption><image:title>crmitre23lpfeatured1</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-the-andromeda-botnet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image7-4.png</image:loc><image:caption>image74</image:caption><image:title>image74</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-1.png</image:loc><image:caption>CybereasonBlogTemplate31</image:caption><image:title>CybereasonBlogTemplate31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T131959.309.png</image:loc><image:caption>blogposttext20220926T131959309</image:caption><image:title>blogposttext20220926T131959309</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-07-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-y2k-bug-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/perry-chen.jpg</image:loc><image:caption>perrychen</image:caption><image:title>perrychen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2024-05-28</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-deep-2018-unites-hundreds-of-attendees-to-change-the-cybersecurity-mindset</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-10-17</lastmod></url><url><loc>https://www.cybereason.com/datasheets</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Cybereason-DS-Cybereason-Endpoint-Sensor_Page_1-800x1000.jpg</image:loc><image:caption>CybereasonDSCybereasonEndpointSensorPage1800x1000</image:caption><image:title>CybereasonDSCybereasonEndpointSensorPage1800x1000</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason-Logo-stacked-white.png</image:loc><image:caption>CybereasonLogostackedwhite</image:caption><image:title>CybereasonLogostackedwhite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Untitled-design-17.jpg</image:loc><image:caption>Untitleddesign17</image:caption><image:title>Untitleddesign17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Cybereason-Detection-and-Response-Platform-01-800x1000.png</image:loc><image:caption>CybereasonDetectionandResponsePlatform01800x1000</image:caption><image:title>CybereasonDetectionandResponsePlatform01800x1000</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Cybereason-Rapid-Deployment-Immediate-Detection-01-800x1000.png</image:loc><image:caption>CybereasonRapidDeploymentImmediateDetection01800x1000</image:caption><image:title>CybereasonRapidDeploymentImmediateDetection01800x1000</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Attack-Disruption-Datasheet-coversheet-1.png</image:loc><image:caption>AttackDisruptionDatasheetcoversheet1</image:caption><image:title>AttackDisruptionDatasheetcoversheet1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Cybereason-DS-Adversary-Hunting-Service_Page_1-800x1000.jpg</image:loc><image:caption>CybereasonDSAdversaryHuntingServicePage1800x1000</image:caption><image:title>CybereasonDSAdversaryHuntingServicePage1800x1000</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Untitled-design-24.png</image:loc><image:caption>Untitleddesign24</image:caption><image:title>Untitleddesign24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Cybereason-Data-Sheet-Incident-Response_Page_1-800x1000.jpg</image:loc><image:caption>CybereasonDataSheetIncidentResponsePage1800x1000</image:caption><image:title>CybereasonDataSheetIncidentResponsePage1800x1000</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Hunting-Engine-Deep-Dive.png</image:loc><image:caption>HuntingEngineDeepDive</image:caption><image:title>HuntingEngineDeepDive</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20July%202017/Images/Cybereason-DS-Advanced-Endpoint-Detection_Page_1-800x1000.jpg</image:loc><image:caption>CybereasonDSAdvancedEndpointDetectionPage1800x1000</image:caption><image:title>CybereasonDSAdvancedEndpointDetectionPage1800x1000</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20June%202017/white_logo.jpg</image:loc><image:caption>whitelogo</image:caption><image:title>whitelogo</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-nocturnus-team-discovers-a-new-variant-of-the-prolific-ursnif-banking-malware-targeting-customers-of-many-japanese-banks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-03-13</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-deep-2017-highlights-and-takeaways</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/DEEP17-banner.png</image:loc><image:caption>DEEP17banner</image:caption><image:title>DEEP17banner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(77).png</image:loc><image:caption>blogposttext77</image:caption><image:title>blogposttext77</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-07-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/spain-breaks-up-cybercrime-gang-after-1.2-billion-spree-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Boston%20Herald-1.png</image:loc><image:caption>BostonHerald1</image:caption><image:title>BostonHerald1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2018-03-26</lastmod></url><url><loc>https://www.cybereason.com/blog/malcious-life-podcast-the-great-firewall-of-china-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-247-Card.png</image:loc><image:caption>MLEp247Card</image:caption><image:title>MLEp247Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/86%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>86MALICIOUSLIFE</image:caption><image:title>86MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-extended-detection-and-response-xdr-past-present-and-future</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eric.png</image:loc><image:caption>eric</image:caption><image:title>eric</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(9).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews9</image:caption><image:title>CopyofBLOGSOCIALSETNews9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(10).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews10</image:caption><image:title>CopyofBLOGSOCIALSETNews10</image:title></image:image><lastmod>2021-08-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-jester-hacktivist-for-good</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5).png</image:loc><image:caption>MaliciousLifeepisode5</image:caption><image:title>MaliciousLifeepisode5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile.jpg</image:loc><image:caption>Profile</image:caption><image:title>Profile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(6).png</image:loc><image:caption>MaliciousLifeTemplate6</image:caption><image:title>MaliciousLifeTemplate6</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-a-vpn-and-how-can-it-help-enterprises-with-remote-workers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(2).png</image:loc><image:caption>BLOGImagesTemplatev22</image:caption><image:title>BLOGImagesTemplatev22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/VPN-Blog-A.png</image:loc><image:caption>VPNBlogA</image:caption><image:title>VPNBlogA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason-Logo-no-text-dark-gray-128x128.png</image:loc><image:caption>CybereasonLogonotextdarkgray128x128</image:caption><image:title>CybereasonLogonotextdarkgray128x128</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(13).png</image:loc><image:caption>BLOGImagesTemplatev213</image:caption><image:title>BLOGImagesTemplatev213</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/press/11-essential-cybersecurity-controls</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR-TOP-11-CONTROLS-web-images-BLOG-Opt.3-V02.png</image:loc><image:caption>CRTOP11CONTROLSwebimagesBLOGOpt3V02</image:caption><image:title>CRTOP11CONTROLSwebimagesBLOGOpt3V02</image:title></image:image><lastmod>2025-09-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/intel-cybereason-beat-ransomware-with-hardware-shield</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SDX%20Central%20logo-3.png</image:loc><image:caption>SDXCentrallogo3</image:caption><image:title>SDXCentrallogo3</image:title></image:image><lastmod>2021-02-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-raises-100m-from-softbank-to-address-increasing-iot-risks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/zdnet-logo-large.png</image:loc><image:caption>zdnetlogolarge</image:caption><image:title>zdnetlogolarge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/international-womens-day-girls-should-never-give-up</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-1.png</image:loc><image:caption>CybereasonBlogTemplate31</image:caption><image:title>CybereasonBlogTemplate31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jean%20Lethuillier.jpg</image:loc><image:caption>JeanLethuillier</image:caption><image:title>JeanLethuillier</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T131959.309.png</image:loc><image:caption>blogposttext20220926T131959309</image:caption><image:title>blogposttext20220926T131959309</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IWD%20blog%20Jean%20Lethuillier.png</image:loc><image:caption>IWDblogJeanLethuillier</image:caption><image:title>IWDblogJeanLethuillier</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-03-11</lastmod></url><url><loc>https://www.cybereason.com/blog/black-hat-talk-cybereason-ciso-israel-barak-on-the-perils-of-dismissing-commodity-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(60).png</image:loc><image:caption>blogposttext60</image:caption><image:title>blogposttext60</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_378418264-1000x391.jpg</image:loc><image:caption>shutterstock3784182641000x391</image:caption><image:title>shutterstock3784182641000x391</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/blog/three-secrets-to-ending-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-14T134316.545.png</image:loc><image:caption>blogposttext20220914T134316545</image:caption><image:title>blogposttext20220914T134316545</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(20)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews201</image:caption><image:title>CopyofBLOGSOCIALSETNews201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(8)-1.png</image:loc><image:caption>CybereasonBlogTemplate81</image:caption><image:title>CybereasonBlogTemplate81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8994.jpg</image:loc><image:caption>IMG8994</image:caption><image:title>IMG8994</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-10-20</lastmod></url><url><loc>https://www.cybereason.com/blog/securitys-dual-hiring-challenges-impede-companies-in-the-fight-against-apts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(2).png</image:loc><image:caption>CybereasonBlogtemplate2</image:caption><image:title>CybereasonBlogtemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(63).png</image:loc><image:caption>blogposttext63</image:caption><image:title>blogposttext63</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-1-1024x391.jpg</image:loc><image:caption>Untitleddesign11024x391</image:caption><image:title>Untitleddesign11024x391</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/security-ciso-career-mike-higgins-new-york-times-nbc</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nyt.jpg</image:loc><image:caption>nyt</image:caption><image:title>nyt</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-09-07</lastmod></url><url><loc>https://www.cybereason.com/careers/marketing</loc><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Danielle%20Wood.png</image:loc><image:caption>UbUSpotlightDanielleWood</image:caption><image:title>UbUSpotlightDanielleWood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Josh%20Moody-1.png</image:loc><image:caption>UbUSpotlightJoshMoody1</image:caption><image:title>UbUSpotlightJoshMoody1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/play-btn.png</image:loc><image:caption>playbtn</image:caption><image:title>playbtn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/Marketing-01.jpg</image:loc><image:caption>Marketing01</image:caption><image:title>Marketing01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A1484-2.jpg</image:loc><image:caption>D0A14842</image:caption><image:title>D0A14842</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blue_concrete.jpg</image:loc><image:caption>blueconcrete</image:caption><image:title>blueconcrete</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Volpe_50%20on%20Fire.jpg</image:loc><image:caption>Volpe50onFire</image:caption><image:title>Volpe50onFire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-lessons-learned-from-building-an-isac</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast.png</image:loc><image:caption>CISOStoriespodcast</image:caption><image:title>CISOStoriespodcast</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(5).png</image:loc><image:caption>CISOStoriespodcast5</image:caption><image:title>CISOStoriespodcast5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Grant%20Sewel.png</image:loc><image:caption>GrantSewel</image:caption><image:title>GrantSewel</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-03-10</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-phorpiex-downloader</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/code%20snippet%20process%20creation%20.png</image:loc><image:caption>codesnippetprocesscreation</image:caption><image:title>codesnippetprocesscreation</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/code%20snippet%20of%20lb%20.png</image:loc><image:caption>codesnippetoflb</image:caption><image:title>codesnippetoflb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(2).png</image:loc><image:caption>BLOGImagesTemplatev22</image:caption><image:title>BLOGImagesTemplatev22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/decryptor%20fn.png</image:loc><image:caption>decryptorfn</image:caption><image:title>decryptorfn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/lb%20infection%20flow.png</image:loc><image:caption>lbinfectionflow</image:caption><image:title>lbinfectionflow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/registry%20manipulation.png</image:loc><image:caption>registrymanipulation</image:caption><image:title>registrymanipulation</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Masakazu%20Oku.jpg</image:loc><image:caption>MasakazuOku</image:caption><image:title>MasakazuOku</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/code%20snippet%20payload%20.png</image:loc><image:caption>codesnippetpayload</image:caption><image:title>codesnippetpayload</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/connection%20to%20IP%20address.png</image:loc><image:caption>connectiontoIPaddress</image:caption><image:title>connectiontoIPaddress</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/copies%20itself%20into.png</image:loc><image:caption>copiesitselfinto</image:caption><image:title>copiesitselfinto</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/decrpyting%20lib.png</image:loc><image:caption>decrpytinglib</image:caption><image:title>decrpytinglib</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/malicious%20scr.png</image:loc><image:caption>maliciousscr</image:caption><image:title>maliciousscr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/twizt%20infection%20flow.png</image:loc><image:caption>twiztinfectionflow</image:caption><image:title>twiztinfectionflow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/text%20section%20rewrite.png</image:loc><image:caption>textsectionrewrite</image:caption><image:title>textsectionrewrite</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/deletes%20zone%20identifier.png</image:loc><image:caption>deleteszoneidentifier</image:caption><image:title>deleteszoneidentifier</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/zone.identifier.png</image:loc><image:caption>zoneidentifier</image:caption><image:title>zoneidentifier</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/deletes%20URL%20Cache.png</image:loc><image:caption>deletesURLCache</image:caption><image:title>deletesURLCache</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/phorpiex%20to%20lockbit.png</image:loc><image:caption>phorpiextolockbit</image:caption><image:title>phorpiextolockbit</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/email%20subject.png</image:loc><image:caption>emailsubject</image:caption><image:title>emailsubject</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/phishing%20email.png</image:loc><image:caption>phishingemail</image:caption><image:title>phishingemail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/lockbit-3-blog-card.png</image:loc><image:caption>lockbit3blogcard</image:caption><image:title>lockbit3blogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/confirm%20existence.png</image:loc><image:caption>confirmexistence</image:caption><image:title>confirmexistence</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/shortcut%20file.png</image:loc><image:caption>shortcutfile</image:caption><image:title>shortcutfile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(5).png</image:loc><image:caption>ThreatAlerttemplate5</image:caption><image:title>ThreatAlerttemplate5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/create%20jpg.png</image:loc><image:caption>createjpg</image:caption><image:title>createjpg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/connect%20to%20twizt.png</image:loc><image:caption>connecttotwizt</image:caption><image:title>connecttotwizt</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/creates%20persistence%20by%20.png</image:loc><image:caption>createspersistenceby</image:caption><image:title>createspersistenceby</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/mutex%20preload.png</image:loc><image:caption>mutexpreload</image:caption><image:title>mutexpreload</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/GET%20request.png</image:loc><image:caption>GETrequest</image:caption><image:title>GETrequest</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20images%20-%20phorpiex/memory%20protection%20update.png</image:loc><image:caption>memoryprotectionupdate</image:caption><image:title>memoryprotectionupdate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Mahadev%20Joshi.png</image:loc><image:caption>MahadevJoshi</image:caption><image:title>MahadevJoshi</image:title></image:image><lastmod>2025-01-28</lastmod></url><url><loc>https://www.cybereason.com/blog/watch-our-video-what-is-the-benefit-of-using-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200x627_Holiday%20ransomware.jpg</image:loc><image:caption>1200x627Holidayransomware</image:caption><image:title>1200x627Holidayransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Capture-1024x391.jpg</image:loc><image:caption>Capture1024x391</image:caption><image:title>Capture1024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2022%20Holiday%20Ransomware%20Study.png</image:loc><image:caption>2022HolidayRansomwareStudy</image:caption><image:title>2022HolidayRansomwareStudy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2018-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-october-18th-2022-the-true-cost-of-ransomware-evaluating-risk-and-how-to-avoid-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/cody-circle-headshot.png</image:loc><image:caption>codycircleheadshot</image:caption><image:title>codycircleheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Sam-Curry-circle.png</image:loc><image:caption>SamCurrycircle</image:caption><image:title>SamCurrycircle</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(121).png</image:loc><image:caption>blogposttext121</image:caption><image:title>blogposttext121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-29T100914.455.png</image:loc><image:caption>blogposttext20220929T100914455</image:caption><image:title>blogposttext20220929T100914455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94).png</image:loc><image:caption>blogposttext94</image:caption><image:title>blogposttext94</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-09-30</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-stops-customers-from-bad-rabbit-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-12</lastmod></url><url><loc>https://www.cybereason.com/blog/fauxpersky-credstealer-malware-autohotkey-kaspersky-antivirus</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-5.png</image:loc><image:caption>image55</image:caption><image:title>image55</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-10.png</image:loc><image:caption>image210</image:caption><image:title>image210</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-3.png</image:loc><image:caption>image63</image:caption><image:title>image63</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-4.png</image:loc><image:caption>image154</image:caption><image:title>image154</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-2.png</image:loc><image:caption>image182</image:caption><image:title>image182</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-4.png</image:loc><image:caption>image44</image:caption><image:title>image44</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-4.png</image:loc><image:caption>image144</image:caption><image:title>image144</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-5.png</image:loc><image:caption>image85</image:caption><image:title>image85</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-3.png</image:loc><image:caption>image173</image:caption><image:title>image173</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/powerless.png</image:loc><image:caption>powerless</image:caption><image:title>powerless</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-3.png</image:loc><image:caption>image73</image:caption><image:title>image73</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-2.png</image:loc><image:caption>image202</image:caption><image:title>image202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-3.png</image:loc><image:caption>image93</image:caption><image:title>image93</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-2.png</image:loc><image:caption>image162</image:caption><image:title>image162</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-12.png</image:loc><image:caption>image112</image:caption><image:title>image112</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-8.png</image:loc><image:caption>image38</image:caption><image:title>image38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-3.png</image:loc><image:caption>image133</image:caption><image:title>image133</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-2.png</image:loc><image:caption>image192</image:caption><image:title>image192</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Behavioral-Intelligence-1.jpg</image:loc><image:caption>BehavioralIntelligence1</image:caption><image:title>BehavioralIntelligence1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-3.png</image:loc><image:caption>image103</image:caption><image:title>image103</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-3.png</image:loc><image:caption>image113</image:caption><image:title>image113</image:title></image:image><lastmod>2019-06-12</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-named-a-leader-in-2022-gartner-magic-quadrant-for-endpoint-protection-platforms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/on-prem-vs-cloud-blog.png</image:loc><image:caption>onpremvscloudblog</image:caption><image:title>onpremvscloudblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8481.png</image:loc><image:caption>IMG8481</image:caption><image:title>IMG8481</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-07T083517.794.png</image:loc><image:caption>blogposttext20220907T083517794</image:caption><image:title>blogposttext20220907T083517794</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Gartner%20Magic%20Quadrant%20EPP%202022.png</image:loc><image:caption>GartnerMagicQuadrantEPP2022</image:caption><image:title>GartnerMagicQuadrantEPP2022</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2023-04-04</lastmod></url><url><loc>https://www.cybereason.com/blog/2024-mitre-results</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE%20ATT&amp;CK%20Enterprise%20Evaluation%202024_Final.pptx.png</image:loc><image:caption>MITREATTCKEnterpriseEvaluation2024Finalpptx</image:caption><image:title>MITREATTCKEnterpriseEvaluation2024Finalpptx</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><lastmod>2024-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-stuxnet-part-3</loc><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV-redefined-blog-post-text.png</image:loc><image:caption>NGAVredefinedblogposttext</image:caption><image:title>NGAVredefinedblogposttext</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/9%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>9MALICIOUSLIFE1</image:caption><image:title>9MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sobczak_Blake_photo.jpg</image:loc><image:caption>SobczakBlakephoto</image:caption><image:title>SobczakBlakephoto</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Andrew%20Ginter.png</image:loc><image:caption>AndrewGinter</image:caption><image:title>AndrewGinter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-darkgate-loader</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/darkgate-blog-diagram.jpg</image:loc><image:caption>darkgateblogdiagram</image:caption><image:title>darkgateblogdiagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Derrick%20Masters.png</image:loc><image:caption>DerrickMasters</image:caption><image:title>DerrickMasters</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-21T133543.854.png</image:loc><image:caption>blogposttext20220621T133543854</image:caption><image:title>blogposttext20220621T133543854</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/activemq-blog-featured.png</image:loc><image:caption>activemqblogfeatured</image:caption><image:title>activemqblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/uma-hs.jpg</image:loc><image:caption>umahs</image:caption><image:title>umahs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/hema-hs.png</image:loc><image:caption>hemahs</image:caption><image:title>hemahs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/darkgate-featured.png</image:loc><image:caption>darkgatefeatured</image:caption><image:title>darkgatefeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Kotaro-Ogino.jpg</image:loc><image:caption>KotaroOgino</image:caption><image:title>KotaroOgino</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Ralph-Villanueva.png</image:loc><image:caption>RalphVillanueva</image:caption><image:title>RalphVillanueva</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-stop-reporting-useless-security-metrics</loc><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(4)-2.png</image:loc><image:caption>pastedimage042</image:caption><image:title>pastedimage042</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG-May-02-2021-12-53-38-65-PM.png</image:loc><image:caption>BLOGMay02202112533865PM</image:caption><image:title>BLOGMay02202112533865PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-deep-dive-into-the-growing-gootloader-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Week%20logo-Feb-08-2023-02-44-23-3052-PM.png</image:loc><image:caption>SecurityWeeklogoFeb0820230244233052PM</image:caption><image:title>SecurityWeeklogoFeb0820230244233052PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2023-02-08</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/shai-horovitz</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/bg-hero-thankyou-1.jpg</image:loc><image:caption>bgherothankyou1</image:caption><image:title>bgherothankyou1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shai-horovitz-headshot.jpg</image:loc><image:caption>shaihorovitzheadshot</image:caption><image:title>shaihorovitzheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/oracle-cybereason-partnership-blog-card.png</image:loc><image:caption>oraclecybereasonpartnershipblogcard</image:caption><image:title>oraclecybereasonpartnershipblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-synnex-1.png</image:loc><image:caption>cybereasonsynnex1</image:caption><image:title>cybereasonsynnex1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/careers/security-services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Chris%20Black%20lockpicking.jpg</image:loc><image:caption>ChrisBlacklockpicking</image:caption><image:title>ChrisBlacklockpicking</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UbU%20Spotlight%20--%20Danielle%20Wood.png</image:loc><image:caption>UbUSpotlightDanielleWood</image:caption><image:title>UbUSpotlightDanielleWood</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/Security-01.jpg</image:loc><image:caption>Security01</image:caption><image:title>Security01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SOC%20Holiday%20Photo%20shoot.jpg</image:loc><image:caption>SOCHolidayPhotoshoot</image:caption><image:title>SOCHolidayPhotoshoot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0554.jpg</image:loc><image:caption>D0A0554</image:caption><image:title>D0A0554</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/play-btn.png</image:loc><image:caption>playbtn</image:caption><image:title>playbtn</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blue_concrete.jpg</image:loc><image:caption>blueconcrete</image:caption><image:title>blueconcrete</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2018-09-06</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-segwit2x-or-the-year-bitcoiners-will-never-forget-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(17).png</image:loc><image:caption>MaliciousLifeepisode17</image:caption><image:title>MaliciousLifeepisode17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/80%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>80MALICIOUSLIFE</image:caption><image:title>80MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-answering-questions-for-evaluating-edr-tools</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(21)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews211</image:caption><image:title>CopyofBLOGSOCIALSETNews211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/10-EDR-answers.jpg</image:loc><image:caption>10EDRanswers</image:caption><image:title>10EDRanswers</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(62).png</image:loc><image:caption>blogposttext62</image:caption><image:title>blogposttext62</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/research/new-cyber-espionage-campaigns-targeting-palestinians-part-one</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image15-10.png</image:loc><image:caption>image1510</image:caption><image:title>image1510</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-10.png</image:loc><image:caption>image1210</image:caption><image:title>image1210</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Decompiled-Autoit-script.png</image:loc><image:caption>DecompiledAutoitscript</image:caption><image:title>DecompiledAutoitscript</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-13.png</image:loc><image:caption>image1413</image:caption><image:title>image1413</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image25-2.png</image:loc><image:caption>image252</image:caption><image:title>image252</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-10.png</image:loc><image:caption>image910</image:caption><image:title>image910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-7.png</image:loc><image:caption>image167</image:caption><image:title>image167</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-21.png</image:loc><image:caption>image121</image:caption><image:title>image121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-4.png</image:loc><image:caption>image234</image:caption><image:title>image234</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-13.png</image:loc><image:caption>image813</image:caption><image:title>image813</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/strifewater.png</image:loc><image:caption>strifewater</image:caption><image:title>strifewater</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-5.png</image:loc><image:caption>image235</image:caption><image:title>image235</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-11.png</image:loc><image:caption>image1311</image:caption><image:title>image1311</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-8.png</image:loc><image:caption>image178</image:caption><image:title>image178</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-11.png</image:loc><image:caption>image711</image:caption><image:title>image711</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-9.png</image:loc><image:caption>image119</image:caption><image:title>image119</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-7.png</image:loc><image:caption>image217</image:caption><image:title>image217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/palestine-attacks-blog-image.png</image:loc><image:caption>palestineattacksblogimage</image:caption><image:title>palestineattacksblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-7.png</image:loc><image:caption>image197</image:caption><image:title>image197</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-13.png</image:loc><image:caption>image1313</image:caption><image:title>image1313</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-11.png</image:loc><image:caption>image1411</image:caption><image:title>image1411</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-12.png</image:loc><image:caption>image412</image:caption><image:title>image412</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-7.png</image:loc><image:caption>image187</image:caption><image:title>image187</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-10.png</image:loc><image:caption>image1010</image:caption><image:title>image1010</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-11.png</image:loc><image:caption>image611</image:caption><image:title>image611</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-16.png</image:loc><image:caption>image316</image:caption><image:title>image316</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-5.png</image:loc><image:caption>image245</image:caption><image:title>image245</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-13.png</image:loc><image:caption>image513</image:caption><image:title>image513</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-7.png</image:loc><image:caption>image207</image:caption><image:title>image207</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/cve-2025-55182-rce-vulnerability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/devon-ackerman.png</image:loc><image:caption>devonackerman</image:caption><image:title>devonackerman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(36).png</image:loc><image:caption>BLOGImagesTemplatev236</image:caption><image:title>BLOGImagesTemplatev236</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/React%20CVE/Screenshot%202025-12-08%20132432.png</image:loc><image:caption>Screenshot20251208132432</image:caption><image:title>Screenshot20251208132432</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(16).png</image:loc><image:caption>BLOGImagesTemplatev216</image:caption><image:title>BLOGImagesTemplatev216</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-21T133543.854.png</image:loc><image:caption>blogposttext20220621T133543854</image:caption><image:title>blogposttext20220621T133543854</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2025-12-08</lastmod></url><url><loc>https://www.cybereason.com/blog/how-cybereason-prevents-and-detects-exploits-leveraging-log4shell-vulnerability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(34)-1.png</image:loc><image:caption>CybereasonBlogTemplate341</image:caption><image:title>CybereasonBlogTemplate341</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ken%20Westin.png</image:loc><image:caption>KenWestin</image:caption><image:title>KenWestin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Justin%20B.png</image:loc><image:caption>JustinB</image:caption><image:title>JustinB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(3).png</image:loc><image:caption>MaliciousLifeTemplate3</image:caption><image:title>MaliciousLifeTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Dec-15-2021-05-43-21-26-PM.png</image:loc><image:caption>image1Dec15202105432126PM</image:caption><image:title>image1Dec15202105432126PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-12-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/intel-teams-with-cybereason-to-fight-ransomware-at-the-cpu-level</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Techspective%20logo-1.png</image:loc><image:caption>Techspectivelogo1</image:caption><image:title>Techspectivelogo1</image:title></image:image><lastmod>2021-02-04</lastmod></url><url><loc>https://www.cybereason.com/blog/category/podcasts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Podcast%20LabMD%20vs%20FTC.png</image:loc><image:caption>MaliciousLifePodcastLabMDvsFTC</image:caption><image:title>MaliciousLifePodcastLabMDvsFTC</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(23).png</image:loc><image:caption>MaliciousLifeepisode23</image:caption><image:title>MaliciousLifeepisode23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(21).png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(6).png</image:loc><image:caption>CISOStoriespodcast6</image:caption><image:title>CISOStoriespodcast6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(1)-1.png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/generative-ai-dangerous-ep-222.png</image:loc><image:caption>generativeaidangerousep222</image:caption><image:title>generativeaidangerousep222</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(4).png</image:loc><image:caption>CISOStoriespodcast4</image:caption><image:title>CISOStoriespodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-246-Card.png</image:loc><image:caption>MLEp246Card</image:caption><image:title>MLEp246Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(20).png</image:loc><image:caption>MaliciousLifeepisode20</image:caption><image:title>MaliciousLifeepisode20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-241-Card.png</image:loc><image:caption>MLEp241Card</image:caption><image:title>MLEp241Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/sony-bmg-rootkit-ep-218.png</image:loc><image:caption>sonybmgrootkitep218</image:caption><image:title>sonybmgrootkitep218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7).png</image:loc><image:caption>MaliciousLifeepisode7</image:caption><image:title>MaliciousLifeepisode7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-242-Card.png</image:loc><image:caption>MLEp242Card</image:caption><image:title>MLEp242Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Would%20Happen%20if%20CBS%20Got%20Hacked.png</image:loc><image:caption>WhatWouldHappenifCBSGotHacked</image:caption><image:title>WhatWouldHappenifCBSGotHacked</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode.png</image:loc><image:caption>MaliciousLifeepisode</image:caption><image:title>MaliciousLifeepisode</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5).png</image:loc><image:caption>MaliciousLifeepisode5</image:caption><image:title>MaliciousLifeepisode5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(7).png</image:loc><image:caption>Maliciouslifepodcast7</image:caption><image:title>Maliciouslifepodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(32).png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt1-ep-210.png</image:loc><image:caption>lawrenceberkelehackpt1ep210</image:caption><image:title>lawrenceberkelehackpt1ep210</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-244-Card.png</image:loc><image:caption>MLEp244Card</image:caption><image:title>MLEp244Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(30).png</image:loc><image:caption>MaliciousLifeepisode30</image:caption><image:title>MaliciousLifeepisode30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(31).png</image:loc><image:caption>MaliciousLifeepisode31</image:caption><image:title>MaliciousLifeepisode31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-226-Card.png</image:loc><image:caption>MLEp226Card</image:caption><image:title>MLEp226Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5)-1.png</image:loc><image:caption>MaliciousLifeepisode51</image:caption><image:title>MaliciousLifeepisode51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ad-fraud-pt1-ep-217.png</image:loc><image:caption>adfraudpt1ep217</image:caption><image:title>adfraudpt1ep217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(14).png</image:loc><image:caption>MaliciousLifeepisode14</image:caption><image:title>MaliciousLifeepisode14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Russian%20Business%20Network.png</image:loc><image:caption>TheRussianBusinessNetwork</image:caption><image:title>TheRussianBusinessNetwork</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7)-1.png</image:loc><image:caption>MaliciousLifeepisode71</image:caption><image:title>MaliciousLifeepisode71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/how-countries-can-lose-the-internet-ep-213.png</image:loc><image:caption>howcountriescanlosetheinternetep213</image:caption><image:title>howcountriescanlosetheinternetep213</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4)-1.png</image:loc><image:caption>MaliciousLifeepisode41</image:caption><image:title>MaliciousLifeepisode41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-248-Card.png</image:loc><image:caption>MLEp248Card</image:caption><image:title>MLEp248Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/reason-you-dont-have-data-privacy-ep-214.png</image:loc><image:caption>reasonyoudonthavedataprivacyep214</image:caption><image:title>reasonyoudonthavedataprivacyep214</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-229-Card.png</image:loc><image:caption>MLEp229Card</image:caption><image:title>MLEp229Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(15).png</image:loc><image:caption>MaliciousLifeepisode15</image:caption><image:title>MaliciousLifeepisode15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(12).png</image:loc><image:caption>MaliciousLifeepisode12</image:caption><image:title>MaliciousLifeepisode12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(1).png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(26).png</image:loc><image:caption>MaliciousLifeepisode26</image:caption><image:title>MaliciousLifeepisode26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(8).png</image:loc><image:caption>CISOStoriespodcast8</image:caption><image:title>CISOStoriespodcast8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/nfts-disappear-mlbside-ep-207.png</image:loc><image:caption>nftsdisappearmlbsideep207</image:caption><image:title>nftsdisappearmlbsideep207</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(29).png</image:loc><image:caption>MaliciousLifeepisode29</image:caption><image:title>MaliciousLifeepisode29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-223-Card.png</image:loc><image:caption>MLEp223Card</image:caption><image:title>MLEp223Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jailbreaking%20Tractors-1.png</image:loc><image:caption>JailbreakingTractors1</image:caption><image:title>JailbreakingTractors1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(13).png</image:loc><image:caption>MaliciousLifeepisode13</image:caption><image:title>MaliciousLifeepisode13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(7).png</image:loc><image:caption>CISOStoriespodcast7</image:caption><image:title>CISOStoriespodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-1.png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-233-Card.png</image:loc><image:caption>MLEp233Card</image:caption><image:title>MLEp233Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ML-Ep-249-featured.png</image:loc><image:caption>MLEp249featured</image:caption><image:title>MLEp249featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(18).png</image:loc><image:caption>MaliciousLifeepisode18</image:caption><image:title>MaliciousLifeepisode18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(24).png</image:loc><image:caption>MaliciousLifeepisode24</image:caption><image:title>MaliciousLifeepisode24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(9).png</image:loc><image:caption>MaliciousLifeepisode9</image:caption><image:title>MaliciousLifeepisode9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ad-fraud-pt2-ep-217.png</image:loc><image:caption>adfraudpt2ep217</image:caption><image:title>adfraudpt2ep217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/russian-fake-news-explained-mlbside-ep-209.png</image:loc><image:caption>russianfakenewsexplainedmlbsideep209</image:caption><image:title>russianfakenewsexplainedmlbsideep209</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-234-card.png</image:loc><image:caption>mlep234card</image:caption><image:title>mlep234card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(6).png</image:loc><image:caption>Maliciouslifepodcast6</image:caption><image:title>Maliciouslifepodcast6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-239-Card.png</image:loc><image:caption>MLEp239Card</image:caption><image:title>MLEp239Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(3)-2.png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Can%20Chess%20Grandmasters%20Teach%20Us.png</image:loc><image:caption>WhatCanChessGrandmastersTeachUs</image:caption><image:title>WhatCanChessGrandmastersTeachUs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-252-featured.png</image:loc><image:caption>MLEp252featured</image:caption><image:title>MLEp252featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-251-featured.png</image:loc><image:caption>MLEp251featured</image:caption><image:title>MLEp251featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-224-Card.png</image:loc><image:caption>MLEp224Card</image:caption><image:title>MLEp224Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-236-card.png</image:loc><image:caption>mlep236card</image:caption><image:title>mlep236card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/voynich-ep-220.png</image:loc><image:caption>voynichep220</image:caption><image:title>voynichep220</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(8).png</image:loc><image:caption>MaliciousLifeepisode8</image:caption><image:title>MaliciousLifeepisode8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/operation-ivy-bells-ep-208.png</image:loc><image:caption>operationivybellsep208</image:caption><image:title>operationivybellsep208</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/olympic-destroyer-ep-212.png</image:loc><image:caption>olympicdestroyerep212</image:caption><image:title>olympicdestroyerep212</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-247-Card.png</image:loc><image:caption>MLEp247Card</image:caption><image:title>MLEp247Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(17).png</image:loc><image:caption>MaliciousLifeepisode17</image:caption><image:title>MaliciousLifeepisode17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-245-Card.png</image:loc><image:caption>MLEp245Card</image:caption><image:title>MLEp245Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-thamar-reservoir.png</image:loc><image:caption>MaliciousLifeepisodethamarreservoir</image:caption><image:title>MaliciousLifeepisodethamarreservoir</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(3)-1.png</image:loc><image:caption>MaliciousLifeepisode31</image:caption><image:title>MaliciousLifeepisode31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4).png</image:loc><image:caption>MaliciousLifeepisode4</image:caption><image:title>MaliciousLifeepisode4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/bug-bounty-programs-ep-221.png</image:loc><image:caption>bugbountyprogramsep221</image:caption><image:title>bugbountyprogramsep221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(2)-1.png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-232-Card.png</image:loc><image:caption>MLEp232Card</image:caption><image:title>MLEp232Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-225-Card.png</image:loc><image:caption>MLEp225Card</image:caption><image:title>MLEp225Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(2).png</image:loc><image:caption>MaliciousLifeepisode2</image:caption><image:title>MaliciousLifeepisode2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20to%20Not%20Build%20a%20Cybersecurity%20Startup-1.png</image:loc><image:caption>HowtoNotBuildaCybersecurityStartup1</image:caption><image:title>HowtoNotBuildaCybersecurityStartup1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(10).png</image:loc><image:caption>MaliciousLifeepisode10</image:caption><image:title>MaliciousLifeepisode10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(25).png</image:loc><image:caption>MaliciousLifeepisode25</image:caption><image:title>MaliciousLifeepisode25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-237-card.png</image:loc><image:caption>mlep237card</image:caption><image:title>mlep237card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/economics-of-cybersecurity-ep-215.png</image:loc><image:caption>economicsofcybersecurityep215</image:caption><image:title>economicsofcybersecurityep215</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(28).png</image:loc><image:caption>MaliciousLifeepisode28</image:caption><image:title>MaliciousLifeepisode28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(5).png</image:loc><image:caption>CISOStoriespodcast5</image:caption><image:title>CISOStoriespodcast5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T082054.921.png</image:loc><image:caption>blogposttext20221003T082054921</image:caption><image:title>blogposttext20221003T082054921</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/the%20problem%20with%20kernel%20mode%20anti%20cheat%20software-1.png</image:loc><image:caption>theproblemwithkernelmodeanticheatsoftware1</image:caption><image:title>theproblemwithkernelmodeanticheatsoftware1</image:title></image:image><lastmod>2021-04-12</lastmod></url><url><loc>https://www.cybereason.com/fr/why-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__four-lines-185px.png</image:loc><image:caption>crshapestackfourlines185px</image:caption><image:title>crshapestackfourlines185px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__squares-with-hex.png</image:loc><image:caption>crshapestacksquareswithhex</image:caption><image:title>crshapestacksquareswithhex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__why-third-hex-multi.png</image:loc><image:caption>crshapestackwhythirdhexmulti</image:caption><image:title>crshapestackwhythirdhexmulti</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/defenders_owlsnoname%20(1).png</image:loc><image:caption>defendersowlsnoname1</image:caption><image:title>defendersowlsnoname1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-06-07</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-newest-customer-is-premier-foods-of-great-britain</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-01-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/iot-security-its-not-too-late-to-get-it-right</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Wired.png</image:loc><image:caption>Wired</image:caption><image:title>Wired</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-cisos-need-training-too</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Candy%20Alexander.png</image:loc><image:caption>CandyAlexander</image:caption><image:title>CandyAlexander</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(9).png</image:loc><image:caption>CISOStoriestemplate9</image:caption><image:title>CISOStoriestemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><lastmod>2022-01-25</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-attacks-can-cyber-insurance-protect-your-organization</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(80).png</image:loc><image:caption>blogposttext80</image:caption><image:title>blogposttext80</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(75).png</image:loc><image:caption>blogposttext75</image:caption><image:title>blogposttext75</image:title></image:image><lastmod>2022-04-19</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-mitre-engenuity-center-for-threat-informed-defense-launch-the-attack-flow-project</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(65).png</image:loc><image:caption>blogposttext65</image:caption><image:title>blogposttext65</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-03-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/gootloader-malware-seo-poisoning-targets-healthcare-in-aggressive-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Feb-14-2023-02-43-47-5518-AM.png</image:loc><image:caption>SCMagazinelogoFeb1420230243475518AM</image:caption><image:title>SCMagazinelogoFeb1420230243475518AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2023-02-14</lastmod></url><url><loc>https://www.cybereason.com/resources/cybereasons-2020-security-predictions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ball_2.jpg</image:loc><image:caption>Ball2</image:caption><image:title>Ball2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-12-17</lastmod></url><url><loc>https://www.cybereason.com/resources/gandcrabs-new-evasive-infection-chain</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screen%20Shot%202019-03-19%20at%2013.14.12.png</image:loc><image:caption>ScreenShot20190319at131412</image:caption><image:title>ScreenShot20190319at131412</image:title></image:image><lastmod>2019-05-07</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-can-we-stop-the-ai-cyber-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/generative-ai-dangerous-ep-222.png</image:loc><image:caption>generativeaidangerousep222</image:caption><image:title>generativeaidangerousep222</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Briland-Hitaj.jpg</image:loc><image:caption>BrilandHitaj</image:caption><image:title>BrilandHitaj</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(26).png</image:loc><image:caption>MaliciousLifeepisode26</image:caption><image:title>MaliciousLifeepisode26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Fernando-Perez-Cruz.jpg</image:loc><image:caption>FernandoPerezCruz</image:caption><image:title>FernandoPerezCruz</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Sahar-Abdelnabi.jpg</image:loc><image:caption>SaharAbdelnabi</image:caption><image:title>SaharAbdelnabi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Gil-Gekker.jpg</image:loc><image:caption>GilGekker</image:caption><image:title>GilGekker</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-223-Card.png</image:loc><image:caption>MLEp223Card</image:caption><image:title>MLEp223Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Ben-Sawyer.jpg</image:loc><image:caption>BenSawyer</image:caption><image:title>BenSawyer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/placeholder-headshot-image.jpg</image:loc><image:caption>placeholderheadshotimage</image:caption><image:title>placeholderheadshotimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/Home%20Revamp%20Images/full-banner-bg-mobile.webp</image:loc><image:caption>fullbannerbgmobile</image:caption><image:title>fullbannerbgmobile</image:title></image:image><lastmod>2024-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-a-cost-effective-approach-to-security-risk-management</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(2).png</image:loc><image:caption>CISOStoriespodcast2</image:caption><image:title>CISOStoriespodcast2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(10)-1.png</image:loc><image:caption>CISOStoriestemplate101</image:caption><image:title>CISOStoriestemplate101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(3).png</image:loc><image:caption>CISOStoriespodcast3</image:caption><image:title>CISOStoriespodcast3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jjones-0-5.jpeg</image:loc><image:caption>jjones05</image:caption><image:title>jjones05</image:title></image:image><lastmod>2022-02-17</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-how-to-defend-a-bank-part-1-fusion-centers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/69%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>69MALICIOUSLIFE</image:caption><image:title>69MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(11).png</image:loc><image:caption>MaliciousLifeepisode11</image:caption><image:title>MaliciousLifeepisode11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam%20Curry-2.jpg</image:loc><image:caption>SamCurry2</image:caption><image:title>SamCurry2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/evilnum-hackers-change-tactics-for-targeting-fintech-firms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo.png</image:loc><image:caption>Databreachtodaylogo</image:caption><image:title>Databreachtodaylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-09-03</lastmod></url><url><loc>https://www.cybereason.com/blog/macos-code-signing-the-emperors-old-new-clothes</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T112617.289.png</image:loc><image:caption>blogposttext20221003T112617289</image:caption><image:title>blogposttext20221003T112617289</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Screen-Shot-2017-05-26-at-1_20_33-PM-1.png</image:loc><image:caption>ScreenShot20170526at12033PM1</image:caption><image:title>ScreenShot20170526at12033PM1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Eliad%20Kimhy.jpg</image:loc><image:caption>EliadKimhy</image:caption><image:title>EliadKimhy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/code_signing-1.png</image:loc><image:caption>codesigning1</image:caption><image:title>codesigning1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-recognized-by-crn-as-a-2015-emerging-vendor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CRN-Logo-800x392.png</image:loc><image:caption>CRNLogo800x392</image:caption><image:title>CRNLogo800x392</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/azurescape-vulnerability-more-evidence-that-microsoft-should-leave-security-to-the-experts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/yossi-hs.png</image:loc><image:caption>yossihs</image:caption><image:title>yossihs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(25).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews25</image:caption><image:title>CopyofBLOGSOCIALSETNews25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(17)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews171</image:caption><image:title>CopyofBLOGSOCIALSETNews171</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(2).png</image:loc><image:caption>CybereasonBlogtemplate2</image:caption><image:title>CybereasonBlogtemplate2</image:title></image:image><lastmod>2021-09-13</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-teams-up-with-masscybercenter-to-mentor-college-students</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-04-15</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-ciso-interview-series-jason-callahan-illumina</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Deep%20REspond-1.jpg</image:loc><image:caption>DeepREspond1</image:caption><image:title>DeepREspond1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T141451.987.png</image:loc><image:caption>blogposttext20220725T141451987</image:caption><image:title>blogposttext20220725T141451987</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/JASON%20CALLAHAN.jpg</image:loc><image:caption>JASONCALLAHAN</image:caption><image:title>JASONCALLAHAN</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-02-06</lastmod></url><url><loc>https://www.cybereason.com/resources/the-definitive-guide-to-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/definitive-guide-to-xdr-fi.png</image:loc><image:caption>definitiveguidetoxdrfi</image:caption><image:title>definitiveguidetoxdrfi</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2022-02-10</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-august-11th-2022-ransomware-labs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-27T074703.175.png</image:loc><image:caption>blogposttext20220627T074703175</image:caption><image:title>blogposttext20220627T074703175</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(121).png</image:loc><image:caption>blogposttext121</image:caption><image:title>blogposttext121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/ken-westin-circle-hs.png</image:loc><image:caption>kenwestincirclehs</image:caption><image:title>kenwestincirclehs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-07-27</lastmod></url><url><loc>https://www.cybereason.com/press/wipro-and-cybereason-form-partnership</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/three-reasons-why-endpoints-cannot-remain-a-security-blind-spot</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Forbes_logo.jpg</image:loc><image:caption>Forbeslogo</image:caption><image:title>Forbeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/mitre-attck-wizard-spider-and-sandworm-evaluations-explained</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(60).png</image:loc><image:caption>blogposttext60</image:caption><image:title>blogposttext60</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-2.jpg</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-cyber-posture-assessment</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-cyber-posture-assessment-service-brief_Page_1.png</image:loc><image:caption>crcyberpostureassessmentservicebriefPage1</image:caption><image:title>crcyberpostureassessmentservicebriefPage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2021-05-11</lastmod></url><url><loc>https://www.cybereason.com/blog/cuckoo-spear-pt2-threat-actor-arsenal</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-24.png</image:loc><image:caption>noopdoorblog24</image:caption><image:title>noopdoorblog24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-56.png</image:loc><image:caption>noopdoorblog56</image:caption><image:title>noopdoorblog56</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-36.png</image:loc><image:caption>noopdoorblog36</image:caption><image:title>noopdoorblog36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-35.png</image:loc><image:caption>noopdoorblog35</image:caption><image:title>noopdoorblog35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-40.png</image:loc><image:caption>noopdoorblog40</image:caption><image:title>noopdoorblog40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-27.png</image:loc><image:caption>noopdoorblog27</image:caption><image:title>noopdoorblog27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-20b.png</image:loc><image:caption>noopdoorblog20b</image:caption><image:title>noopdoorblog20b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-41.png</image:loc><image:caption>noopdoorblog41</image:caption><image:title>noopdoorblog41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-45b.png</image:loc><image:caption>noopdoorblog45b</image:caption><image:title>noopdoorblog45b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-46.png</image:loc><image:caption>noopdoorblog46</image:caption><image:title>noopdoorblog46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-part-1-analysis-blog-analysis-featured.png</image:loc><image:caption>cuckoospearpart1analysisbloganalysisfeatured</image:caption><image:title>cuckoospearpart1analysisbloganalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-18.png</image:loc><image:caption>noopdoorblog18</image:caption><image:title>noopdoorblog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-47.png</image:loc><image:caption>noopdoorblog47</image:caption><image:title>noopdoorblog47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-31.png</image:loc><image:caption>noopdoorblog31</image:caption><image:title>noopdoorblog31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-42.png</image:loc><image:caption>noopdoorblog42</image:caption><image:title>noopdoorblog42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-45.png</image:loc><image:caption>noopdoorblog45</image:caption><image:title>noopdoorblog45</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-19.png</image:loc><image:caption>noopdoorblog19</image:caption><image:title>noopdoorblog19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-38.png</image:loc><image:caption>noopdoorblog38</image:caption><image:title>noopdoorblog38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-34.png</image:loc><image:caption>noopdoorblog34</image:caption><image:title>noopdoorblog34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/DLL-Side-Loading-loic.jpg</image:loc><image:caption>DLLSideLoadingloic</image:caption><image:title>DLLSideLoadingloic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-23.png</image:loc><image:caption>noopdoorblog23</image:caption><image:title>noopdoorblog23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-29.png</image:loc><image:caption>noopdoorblog29</image:caption><image:title>noopdoorblog29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-37.png</image:loc><image:caption>noopdoorblog37</image:caption><image:title>noopdoorblog37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-28.png</image:loc><image:caption>noopdoorblog28</image:caption><image:title>noopdoorblog28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-yellow-bg--top-badge.png</image:loc><image:caption>crlogoyellowbgtopbadge</image:caption><image:title>crlogoyellowbgtopbadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-48.png</image:loc><image:caption>noopdoorblog48</image:caption><image:title>noopdoorblog48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Kotaro-Ogino.jpg</image:loc><image:caption>KotaroOgino</image:caption><image:title>KotaroOgino</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-pt-2-featured.png</image:loc><image:caption>cuckoospearpt2featured</image:caption><image:title>cuckoospearpt2featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG%20POST%20(1).png</image:loc><image:caption>BLOGPOST1</image:caption><image:title>BLOGPOST1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-39.png</image:loc><image:caption>noopdoorblog39</image:caption><image:title>noopdoorblog39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-54.png</image:loc><image:caption>noopdoorblog54</image:caption><image:title>noopdoorblog54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-43.png</image:loc><image:caption>noopdoorblog43</image:caption><image:title>noopdoorblog43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-21.png</image:loc><image:caption>noopdoorblog21</image:caption><image:title>noopdoorblog21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-25.png</image:loc><image:caption>noopdoorblog25</image:caption><image:title>noopdoorblog25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-52.png</image:loc><image:caption>noopdoorblog52</image:caption><image:title>noopdoorblog52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-20.png</image:loc><image:caption>noopdoorblog20</image:caption><image:title>noopdoorblog20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-53.png</image:loc><image:caption>noopdoorblog53</image:caption><image:title>noopdoorblog53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-55.png</image:loc><image:caption>noopdoorblog55</image:caption><image:title>noopdoorblog55</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-51.png</image:loc><image:caption>noopdoorblog51</image:caption><image:title>noopdoorblog51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-30.png</image:loc><image:caption>noopdoorblog30</image:caption><image:title>noopdoorblog30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-26.png</image:loc><image:caption>noopdoorblog26</image:caption><image:title>noopdoorblog26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-32.png</image:loc><image:caption>noopdoorblog32</image:caption><image:title>noopdoorblog32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/noopdoor-blog-33.png</image:loc><image:caption>noopdoorblog33</image:caption><image:title>noopdoorblog33</image:title></image:image><lastmod>2024-10-04</lastmod></url><url><loc>https://www.cybereason.com/blog/research/cybereason-vs-revil-ransomware-the-kaseya-chronicles</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(8).png</image:loc><image:caption>Vs8</image:caption><image:title>Vs8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/tom-fakterman.jpg</image:loc><image:caption>tomfakterman</image:caption><image:title>tomfakterman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Vs%20Template%20(1).png</image:loc><image:caption>CybereasonVsTemplate1</image:caption><image:title>CybereasonVsTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-19T104122.517.png</image:loc><image:caption>blogposttext20221019T104122517</image:caption><image:title>blogposttext20221019T104122517</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereasons-malop-severity-score-extended-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/olist-cybereason-mdr.png</image:loc><image:caption>olistcybereasonmdr</image:caption><image:title>olistcybereasonmdr</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-03T125306.964.png</image:loc><image:caption>blogposttext20221003T125306964</image:caption><image:title>blogposttext20221003T125306964</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MalOp%20Severity%20Score%20and%20extended%20response.png</image:loc><image:caption>MalOpSeverityScoreandextendedresponse</image:caption><image:title>MalOpSeverityScoreandextendedresponse</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20MDR%20fast%20efficient%20effective.png</image:loc><image:caption>cybereasonMDRfastefficienteffective</image:caption><image:title>cybereasonMDRfastefficienteffective</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><lastmod>2022-08-30</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-january-11th-2022-live-attack-simulation-ransomware-threat-hunte</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(30).png</image:loc><image:caption>CybereasonBlogTemplate30</image:caption><image:title>CybereasonBlogTemplate30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Headshot%20image%20template%20(6)-1.webp</image:loc><image:caption>CopyofHeadshotimagetemplate61</image:caption><image:title>CopyofHeadshotimagetemplate61</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(7).png</image:loc><image:caption>CybereasonBlogTemplate7</image:caption><image:title>CybereasonBlogTemplate7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template.png</image:loc><image:caption>CybereasonBlogtemplate</image:caption><image:title>CybereasonBlogtemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jj-hex-hs2.png</image:loc><image:caption>jjhexhs2</image:caption><image:title>jjhexhs2</image:title></image:image><lastmod>2021-12-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/behavior-analysis-new-weapon-to-fight-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/dark_reading1.jpg</image:loc><image:caption>darkreading1</image:caption><image:title>darkreading1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/why-security-leaders-need-more-than-technical-skills</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_749142442.jpg</image:loc><image:caption>shutterstock749142442</image:caption><image:title>shutterstock749142442</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(5).png</image:loc><image:caption>CISOStoriespodcast5</image:caption><image:title>CISOStoriespodcast5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mario-duarte.jpg</image:loc><image:caption>marioduarte</image:caption><image:title>marioduarte</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-231-Card.png</image:loc><image:caption>MLEp231Card</image:caption><image:title>MLEp231Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-06-06</lastmod></url><url><loc>https://www.cybereason.com/blog/advanced-persistent-threat-apt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-pt-2-featured.png</image:loc><image:caption>cuckoospearpt2featured</image:caption><image:title>cuckoospearpt2featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-featured-image.png</image:loc><image:caption>crfeaturedimage</image:caption><image:title>crfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cuckoo-spear-part-1-analysis-blog-analysis-featured.png</image:loc><image:caption>cuckoospearpart1analysisbloganalysisfeatured</image:caption><image:title>cuckoospearpart1analysisbloganalysisfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-04-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-is-wannacry-everything-you-need-to-know-about-the-ransomware-cyberattack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Metro.png</image:loc><image:caption>Metro</image:caption><image:title>Metro</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/oracle-mimikatz-dll-hijacking</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Wall-LARGEV2-1.png</image:loc><image:caption>WallLARGEV21</image:caption><image:title>WallLARGEV21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unpack.png</image:loc><image:caption>unpack</image:caption><image:title>unpack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/oneenginedetected.png</image:loc><image:caption>oneenginedetected</image:caption><image:title>oneenginedetected</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/realnature.jpg</image:loc><image:caption>realnature</image:caption><image:title>realnature</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/exitprocess.png</image:loc><image:caption>exitprocess</image:caption><image:title>exitprocess</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(7).png</image:loc><image:caption>BLOGImagesTemplatev27</image:caption><image:title>BLOGImagesTemplatev27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/noenginedetected.png</image:loc><image:caption>noenginedetected</image:caption><image:title>noenginedetected</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/system32.png</image:loc><image:caption>system32</image:caption><image:title>system32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/censoredmachine.jpg</image:loc><image:caption>censoredmachine</image:caption><image:title>censoredmachine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/lsadump.png</image:loc><image:caption>lsadump</image:caption><image:title>lsadump</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/credentialtheft.png</image:loc><image:caption>credentialtheft</image:caption><image:title>credentialtheft</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nj09_censored.jpg</image:loc><image:caption>nj09censored</image:caption><image:title>nj09censored</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-24</lastmod></url><url><loc>https://www.cybereason.com/partners/solution-providers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/authorizedpartner-cr-icons-set-4-mono-01.svg</image:loc><image:caption>authorizedpartnercriconsset4mono01</image:caption><image:title>authorizedpartnercriconsset4mono01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/pioneer-cr-icons-set-4-mono-02.svg</image:loc><image:caption>pioneercriconsset4mono02</image:caption><image:title>pioneercriconsset4mono02</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/defenders-league-logo-badges.png</image:loc><image:caption>defendersleaguelogobadges</image:caption><image:title>defendersleaguelogobadges</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines.png</image:loc><image:caption>crbghexagonlines</image:caption><image:title>crbghexagonlines</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/gamechangers-cr-icons-set-newyellow-4-mono-03.svg</image:loc><image:caption>gamechangerscriconssetnewyellow4mono03</image:caption><image:title>gamechangerscriconssetnewyellow4mono03</image:title></image:image><lastmod>2021-06-09</lastmod></url><url><loc>https://www.cybereason.com/blog/eagle-v.-panda-does-covid-19-rhetoric-have-us-on-the-brink-of-war</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2020-03-19</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-welcomes-boston-mayor-marty-walsh</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/black-basta-using-qbot-malware-to-target-us-based-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Nov-23-2022-03-36-52-1564-PM.png</image:loc><image:caption>BankinfosecuritylogoNov2320220336521564PM</image:caption><image:title>BankinfosecuritylogoNov2320220336521564PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-11-23</lastmod></url><url><loc>https://www.cybereason.com/resources/state-of-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/sor-refresh-card-2.png</image:loc><image:caption>sorrefreshcard2</image:caption><image:title>sorrefreshcard2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2021-03-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-cybereason-americas-channel-chief-joe-odonnell-expands-cybereasons-partner-network</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CRN-Logo-6.png</image:loc><image:caption>CRNLogo6</image:caption><image:title>CRNLogo6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2019-10-15</lastmod></url><url><loc>https://www.cybereason.com/blog/white-paper-inside-complex-ransomops-and-the-ransomware-economy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(75).png</image:loc><image:caption>blogposttext75</image:caption><image:title>blogposttext75</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(13).png</image:loc><image:caption>blogposttext13</image:caption><image:title>blogposttext13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RansomOps.png</image:loc><image:caption>RansomOps</image:caption><image:title>RansomOps</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-key-issues-to-cover-for-todays-cisos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Leon%20Ravenna.jpg</image:loc><image:caption>LeonRavenna</image:caption><image:title>LeonRavenna</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(11).png</image:loc><image:caption>CISOStoriestemplate11</image:caption><image:title>CISOStoriestemplate11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(9).png</image:loc><image:caption>CISOStoriestemplate9</image:caption><image:title>CISOStoriestemplate9</image:title></image:image><lastmod>2022-01-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransom-group-linked-to-colonial-pipeline-hack-is-new-but-experienced</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Reuters%20logo.png</image:loc><image:caption>Reuterslogo</image:caption><image:title>Reuterslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-05-10</lastmod></url><url><loc>https://www.cybereason.com/company/careers/sales-and-marketing</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Chris-Watson.png</image:loc><image:caption>ChrisWatson</image:caption><image:title>ChrisWatson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Abigail-Maines.png</image:loc><image:caption>AbigailMaines</image:caption><image:title>AbigailMaines</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/aoibh-circle-hs-min.png</image:loc><image:caption>aoibhcirclehsmin</image:caption><image:title>aoibhcirclehsmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-respondor-gold-8k--full-wing-transparent.png</image:loc><image:caption>crrespondorgold8kfullwingtransparent</image:caption><image:title>crrespondorgold8kfullwingtransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Maranda-Cigna.png</image:loc><image:caption>MarandaCigna</image:caption><image:title>MarandaCigna</image:title></image:image><lastmod>2022-09-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-episode-6-hell-to-pay-episode-recap</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(1)-2.png</image:loc><image:caption>CybereasonBlogTemplate12</image:caption><image:title>CybereasonBlogTemplate12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Eliad%20Kimhy.jpg</image:loc><image:caption>EliadKimhy</image:caption><image:title>EliadKimhy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Screen-Shot-2017-08-17-at-4.30.03-PM.png</image:loc><image:caption>ScreenShot20170817at43003PM</image:caption><image:title>ScreenShot20170817at43003PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(3)-1.png</image:loc><image:caption>MaliciousLifeepisode31</image:caption><image:title>MaliciousLifeepisode31</image:title></image:image><lastmod>2018-01-24</lastmod></url><url><loc>https://www.cybereason.com/resources/the-impact-of-xdr-on-the-modern-soc</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/esg-xdr-resources-card-a.png</image:loc><image:caption>esgxdrresourcescarda</image:caption><image:title>esgxdrresourcescarda</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2021-01-06</lastmod></url><url><loc>https://www.cybereason.com/blog/what-organizations-should-do-to-protect-against-potential-cybersecurity-threats-brought-on-by-remote-work</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/lawrence-berkele-hack-pt2-ep-211.png</image:loc><image:caption>lawrenceberkelehackpt2ep211</image:caption><image:title>lawrenceberkelehackpt2ep211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sean-mooney-hs.jpg</image:loc><image:caption>seanmooneyhs</image:caption><image:title>seanmooneyhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/remote-workers-hub-blog-image.png</image:loc><image:caption>remoteworkershubblogimage</image:caption><image:title>remoteworkershubblogimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/anydesk-breach-blog-featured.png</image:loc><image:caption>anydeskbreachblogfeatured</image:caption><image:title>anydeskbreachblogfeatured</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/xdr-foundations-leveraging-ai-where-it-matters-most</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-ai.png</image:loc><image:caption>cybereasonxdrai</image:caption><image:title>cybereasonxdrai</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10XFaster.png</image:loc><image:caption>10XFaster</image:caption><image:title>10XFaster</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRXDR.png</image:loc><image:caption>CRXDR</image:caption><image:title>CRXDR</image:title></image:image><lastmod>2023-05-01</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-celebrates-national-cybersecurity-awareness-month</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-10-25</lastmod></url><url><loc>https://www.cybereason.com/blog/market-drivers-for-xdr-and-mssp-service-opportunities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15).png</image:loc><image:caption>CybereasonBlogTemplate15</image:caption><image:title>CybereasonBlogTemplate15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(8).png</image:loc><image:caption>blogposttext8</image:caption><image:title>blogposttext8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Tallent%20Profile%2016.jpg</image:loc><image:caption>TallentProfile16</image:caption><image:title>TallentProfile16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/hacking-the-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-attack-goal.png</image:loc><image:caption>criconattackgoal</image:caption><image:title>criconattackgoal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-hero-bg.jpg</image:loc><image:caption>threatalertherobg</image:caption><image:title>threatalertherobg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-threat-type.png</image:loc><image:caption>criconthreattype</image:caption><image:title>criconthreattype</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/YELLOW_THREAT_ALERT_CR_ICONS-53.svg</image:loc><image:caption>YELLOWTHREATALERTCRICONS53</image:caption><image:title>YELLOWTHREATALERTCRICONS53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-impacted-geo.png</image:loc><image:caption>criconimpactedgeo</image:caption><image:title>criconimpactedgeo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner-Page-Icons-03.png</image:loc><image:caption>PartnerPageIcons03</image:caption><image:title>PartnerPageIcons03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/icons-all/Asset%203.png</image:loc><image:caption>Asset3</image:caption><image:title>Asset3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-remediate-disable.png</image:loc><image:caption>criconremediatedisable</image:caption><image:title>criconremediatedisable</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereasons-principal-security-researcher-is-first-in-world-to-discover-killswitch-to-notpetya</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-18</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-celebrating-five-years-of-malicious-life</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(13).png</image:loc><image:caption>MaliciousLifeepisode13</image:caption><image:title>MaliciousLifeepisode13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-thamar-reservoir.png</image:loc><image:caption>MaliciousLifeepisodethamarreservoir</image:caption><image:title>MaliciousLifeepisodethamarreservoir</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereasons-researchers-release-vaccine-for-critical-log4shell-vulnerability</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bleeping%20Computer%20logo-Dec-14-2021-03-08-55-04-AM.png</image:loc><image:caption>BleepingComputerlogoDec14202103085504AM</image:caption><image:title>BleepingComputerlogoDec14202103085504AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2021-12-14</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-report-all-paths-lead-to-cobalt-strike-icedid-emotet-and-qbot</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Feb-08-2022-11-10-35-77-PM.png</image:loc><image:caption>image8Feb08202211103577PM</image:caption><image:title>image8Feb08202211103577PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27.jpg</image:loc><image:caption>image27</image:caption><image:title>image27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image23-Feb-08-2022-10-56-11-68-PM.png</image:loc><image:caption>image23Feb08202210561168PM</image:caption><image:title>image23Feb08202210561168PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image35-Feb-08-2022-11-06-04-22-PM.png</image:loc><image:caption>image35Feb08202211060422PM</image:caption><image:title>image35Feb08202211060422PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image30-4.png</image:loc><image:caption>image304</image:caption><image:title>image304</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-1.jpg</image:loc><image:caption>image121</image:caption><image:title>image121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image32-4.png</image:loc><image:caption>image324</image:caption><image:title>image324</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Rotem.jpg</image:loc><image:caption>Rotem</image:caption><image:title>Rotem</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-Feb-08-2022-11-03-08-76-PM.png</image:loc><image:caption>image10Feb08202211030876PM</image:caption><image:title>image10Feb08202211030876PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Feb-08-2022-11-07-45-87-PM.png</image:loc><image:caption>image15Feb08202211074587PM</image:caption><image:title>image15Feb08202211074587PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-Feb-08-2022-10-51-37-52-PM.png</image:loc><image:caption>image16Feb08202210513752PM</image:caption><image:title>image16Feb08202210513752PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-Feb-08-2022-10-42-44-23-PM.png</image:loc><image:caption>image18Feb08202210424423PM</image:caption><image:title>image18Feb08202210424423PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image34-4.png</image:loc><image:caption>image344</image:caption><image:title>image344</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Feb-08-2022-10-33-40-24-PM.png</image:loc><image:caption>image14Feb08202210334024PM</image:caption><image:title>image14Feb08202210334024PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Feb-08-2022-10-39-03-49-PM.png</image:loc><image:caption>image4Feb08202210390349PM</image:caption><image:title>image4Feb08202210390349PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image26-Feb-08-2022-10-36-21-22-PM.png</image:loc><image:caption>image26Feb08202210362122PM</image:caption><image:title>image26Feb08202210362122PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image24-Feb-08-2022-11-08-45-43-PM.png</image:loc><image:caption>image24Feb08202211084543PM</image:caption><image:title>image24Feb08202211084543PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image29-4.png</image:loc><image:caption>image294</image:caption><image:title>image294</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-2.jpg</image:loc><image:caption>image32</image:caption><image:title>image32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image33-Feb-08-2022-10-41-21-64-PM.png</image:loc><image:caption>image33Feb08202210412164PM</image:caption><image:title>image33Feb08202210412164PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Feb-08-2022-11-01-18-72-PM.png</image:loc><image:caption>image13Feb08202211011872PM</image:caption><image:title>image13Feb08202211011872PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Feb-08-2022-11-09-30-13-PM.png</image:loc><image:caption>image7Feb08202211093013PM</image:caption><image:title>image7Feb08202211093013PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image22-Feb-08-2022-10-59-23-89-PM.png</image:loc><image:caption>image22Feb08202210592389PM</image:caption><image:title>image22Feb08202210592389PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image28-Feb-08-2022-11-04-48-33-PM.png</image:loc><image:caption>image28Feb08202211044833PM</image:caption><image:title>image28Feb08202211044833PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-Feb-08-2022-10-50-55-35-PM.png</image:loc><image:caption>image21Feb08202210505535PM</image:caption><image:title>image21Feb08202210505535PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Feb-08-2022-10-35-14-89-PM.png</image:loc><image:caption>image2Feb08202210351489PM</image:caption><image:title>image2Feb08202210351489PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-Feb-08-2022-10-58-15-28-PM.png</image:loc><image:caption>image19Feb08202210581528PM</image:caption><image:title>image19Feb08202210581528PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Feb-08-2022-11-11-24-06-PM.jpg</image:loc><image:caption>image11Feb08202211112406PM</image:caption><image:title>image11Feb08202211112406PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Feb-08-2022-11-06-50-43-PM.png</image:loc><image:caption>image6Feb08202211065043PM</image:caption><image:title>image6Feb08202211065043PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-Feb-08-2022-10-31-41-74-PM.png</image:loc><image:caption>image20Feb08202210314174PM</image:caption><image:title>image20Feb08202210314174PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image31-Feb-08-2022-10-52-41-60-PM.png</image:loc><image:caption>image31Feb08202210524160PM</image:caption><image:title>image31Feb08202210524160PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image25-Feb-08-2022-10-32-50-97-PM.png</image:loc><image:caption>image25Feb08202210325097PM</image:caption><image:title>image25Feb08202210325097PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Feb-08-2022-11-02-07-11-PM.png</image:loc><image:caption>image1Feb08202211020711PM</image:caption><image:title>image1Feb08202211020711PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Feb-08-2022-10-54-11-83-PM.png</image:loc><image:caption>image9Feb08202210541183PM</image:caption><image:title>image9Feb08202210541183PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Feb-08-2022-11-03-50-22-PM.png</image:loc><image:caption>image5Feb08202211035022PM</image:caption><image:title>image5Feb08202211035022PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-Feb-08-2022-11-00-18-72-PM.png</image:loc><image:caption>image17Feb08202211001872PM</image:caption><image:title>image17Feb08202211001872PM</image:title></image:image><lastmod>2023-03-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/microsoft-fixes-windows-crypto-bug-reported-by-the-nsa</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/zdnet-4.png</image:loc><image:caption>zdnet4</image:caption><image:title>zdnet4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-01-14</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-ranked-1-technology-company</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-on-premises-deployment</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-defense-platform-on-prem_Page_1.png</image:loc><image:caption>crdefenseplatformonpremPage1</image:caption><image:title>crdefenseplatformonpremPage1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-01-26</lastmod></url><url><loc>https://www.cybereason.com/blog/hacking-team-hacked-team-leak-unleashes-flame-like-capabilities-into-the-wild</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-232-Card.png</image:loc><image:caption>MLEp232Card</image:caption><image:title>MLEp232Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/customerkey.png</image:loc><image:caption>customerkey</image:caption><image:title>customerkey</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/infectionscreenshot-1024x390.png</image:loc><image:caption>infectionscreenshot1024x390</image:caption><image:title>infectionscreenshot1024x390</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/vietnamesescreenshot.png</image:loc><image:caption>vietnamesescreenshot</image:caption><image:title>vietnamesescreenshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(32).png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/hacking-team-screenshot.png</image:loc><image:caption>hackingteamscreenshot</image:caption><image:title>hackingteamscreenshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-places-managed-detection-and-response-in-the-hands-of-msps-and-mssps</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSSP%20Alert%20logo-Aug-17-2022-04-49-35-53-PM.png</image:loc><image:caption>MSSPAlertlogoAug17202204493553PM</image:caption><image:title>MSSPAlertlogoAug17202204493553PM</image:title></image:image><lastmod>2022-08-17</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-june-23rd-live-attack-simulation-xdr-vs.-modern-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eric-sun-headshot.png</image:loc><image:caption>ericsunheadshot</image:caption><image:title>ericsunheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(95).png</image:loc><image:caption>blogposttext95</image:caption><image:title>blogposttext95</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(113).png</image:loc><image:caption>blogposttext113</image:caption><image:title>blogposttext113</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ken_headshot.png</image:loc><image:caption>Kenheadshot</image:caption><image:title>Kenheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><lastmod>2022-05-31</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-totok-part-2-the-masterminds-of-mobile-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Bill%20Marczak.jpg</image:loc><image:caption>BillMarczak</image:caption><image:title>BillMarczak</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1608478002186.jpeg</image:loc><image:caption>1608478002186</image:caption><image:title>1608478002186</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/What%20Would%20Happen%20if%20CBS%20Got%20Hacked.png</image:loc><image:caption>WhatWouldHappenifCBSGotHacked</image:caption><image:title>WhatWouldHappenifCBSGotHacked</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/72%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>72MALICIOUSLIFE</image:caption><image:title>72MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/reason-you-dont-have-data-privacy-ep-214.png</image:loc><image:caption>reasonyoudonthavedataprivacyep214</image:caption><image:title>reasonyoudonthavedataprivacyep214</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-u.s-vs.-gary-mckinnon</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Lior-R-HS-1.png</image:loc><image:caption>LiorRHS1</image:caption><image:title>LiorRHS1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(14).png</image:loc><image:caption>MaliciousLifeepisode14</image:caption><image:title>MaliciousLifeepisode14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/48%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>48MALICIOUSLIFE</image:caption><image:title>48MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-sans-webinar-the-end-of-iocs-a-case-study-on-resolving-persistent-attacks-using-tactics-techniques-and-procedures</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/xdr-castle-sky-blog.png</image:loc><image:caption>xdrcastleskyblog</image:caption><image:title>xdrcastleskyblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_162619025-1000x391.jpg</image:loc><image:caption>shutterstock1626190251000x391</image:caption><image:title>shutterstock1626190251000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-21T130804.218.png</image:loc><image:caption>blogposttext20220921T130804218</image:caption><image:title>blogposttext20220921T130804218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/why-detection-efficacy-should-be-in-your-top-metrics</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-16T071025.313.png</image:loc><image:caption>blogposttext20220816T071025313</image:caption><image:title>blogposttext20220816T071025313</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/smartest-cybersecurity-minds-2024-blog-featured.png</image:loc><image:caption>smartestcybersecurityminds2024blogfeatured</image:caption><image:title>smartestcybersecurityminds2024blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware-shifting-to-cloud.png</image:loc><image:caption>Ransomwareshiftingtocloud</image:caption><image:title>Ransomwareshiftingtocloud</image:title></image:image><lastmod>2022-08-16</lastmod></url><url><loc>https://www.cybereason.com/press/new-cybereason-study-reveals-the-damage-caused-by-ransomware-attacks-against-businesses-on-holidays-and-weekends</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-richard-clarke-getting-the-board-on-board-with-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/654bd3_60315e6b51f345e289321dff694fd3ca_mv2.webp</image:loc><image:caption>654bd360315e6b51f345e289321dff694fd3camv2</image:caption><image:title>654bd360315e6b51f345e289321dff694fd3camv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(4).png</image:loc><image:caption>CISOStoriespodcast4</image:caption><image:title>CISOStoriespodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-03-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/superdrug-receives-threat-over-customer-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Pharmacy%20Magazine.jpg</image:loc><image:caption>PharmacyMagazine</image:caption><image:title>PharmacyMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-08-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/microsoft-foils-russian-attack-on-gop-think-tanks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechNewsWorld%20logo.png</image:loc><image:caption>TechNewsWorldlogo</image:caption><image:title>TechNewsWorldlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2018-08-23</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-briefs-several-u.s.-house-and-senate-committees-on-the-massive-state-sponsored-espionage-campaign-against-critical-infrastructure-telcos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2019-07-29</lastmod></url><url><loc>https://www.cybereason.com/press/new-cybereason-incident-response-and-professional-services-subscription-offers-unlimited-incident-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-05-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-top-10-cybersecurity-funding-rounds-in-massachusetts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-secures-100-million-in-funding-led-by-softbank-corp</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/everything-cybereason-at-the-black-hat-2022-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(78).png</image:loc><image:caption>blogposttext78</image:caption><image:title>blogposttext78</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Jul-07-2022-08-17-03-98-PM.png</image:loc><image:caption>image1Jul07202208170398PM</image:caption><image:title>image1Jul07202208170398PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-rsa-conference-2023.png</image:loc><image:caption>cybereasonrsaconference2023</image:caption><image:title>cybereasonrsaconference2023</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(120).png</image:loc><image:caption>blogposttext120</image:caption><image:title>blogposttext120</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-07-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/supermarket-chain-spinneys-targeted-by-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20National%20(Middle%20East)%20logo-4.png</image:loc><image:caption>TheNationalMiddleEastlogo4</image:caption><image:title>TheNationalMiddleEastlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-genesis-market</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image4.png</image:loc><image:caption>image4</image:caption><image:title>image4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(37)-1.png</image:loc><image:caption>blogposttext371</image:caption><image:title>blogposttext371</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image11.png</image:loc><image:caption>image11</image:caption><image:title>image11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image3.png</image:loc><image:caption>image3</image:caption><image:title>image3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(125).png</image:loc><image:caption>blogposttext125</image:caption><image:title>blogposttext125</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image19.png</image:loc><image:caption>image19</image:caption><image:title>image19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image10.png</image:loc><image:caption>image10</image:caption><image:title>image10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image14.png</image:loc><image:caption>image14</image:caption><image:title>image14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image12.png</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image6.png</image:loc><image:caption>image6</image:caption><image:title>image6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image20.png</image:loc><image:caption>image20</image:caption><image:title>image20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image13.jpg</image:loc><image:caption>image13</image:caption><image:title>image13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image18.png</image:loc><image:caption>image18</image:caption><image:title>image18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image2.png</image:loc><image:caption>image2</image:caption><image:title>image2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image15.png</image:loc><image:caption>image15</image:caption><image:title>image15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(17).png</image:loc><image:caption>BLOGImagesTemplatev217</image:caption><image:title>BLOGImagesTemplatev217</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Genesis%20Market/image17.png</image:loc><image:caption>image17</image:caption><image:title>image17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><lastmod>2025-05-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/10-cool-tech-companies-that-raised-funding-in-july-2021</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN%20logo-Aug-27-2021-12-28-07-00-AM.png</image:loc><image:caption>CRNlogoAug27202112280700AM</image:caption><image:title>CRNlogoAug27202112280700AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-08-27</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/sam-curry</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_436711951-1.jpg</image:loc><image:caption>shutterstock4367119511</image:caption><image:title>shutterstock4367119511</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(21).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews21</image:caption><image:title>CopyofBLOGSOCIALSETNews21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/2020-start-blog.jpg</image:loc><image:caption>2020startblog</image:caption><image:title>2020startblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20vs.%20SolarWinds%20Attack.png</image:loc><image:caption>CybereasonvsSolarWindsAttack</image:caption><image:title>CybereasonvsSolarWindsAttack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/sam-curry-hs-cisostories.png</image:loc><image:caption>samcurryhscisostories</image:caption><image:title>samcurryhscisostories</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-955010382.jpg</image:loc><image:caption>GettyImages955010382</image:caption><image:title>GettyImages955010382</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(12).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews12</image:caption><image:title>CopyofBLOGSOCIALSETNews12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/true%20cost%20to%20business%201200x628.png</image:loc><image:caption>truecosttobusiness1200x628</image:caption><image:title>truecosttobusiness1200x628</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20).png</image:loc><image:caption>CybereasonBlogTemplate20</image:caption><image:title>CybereasonBlogTemplate20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(28).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews28</image:caption><image:title>CopyofBLOGSOCIALSETNews28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(9).png</image:loc><image:caption>CybereasonBlogTemplate9</image:caption><image:title>CybereasonBlogTemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(24).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews24</image:caption><image:title>CopyofBLOGSOCIALSETNews24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_349563746-1.jpg</image:loc><image:caption>shutterstock3495637461</image:caption><image:title>shutterstock3495637461</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(16).png</image:loc><image:caption>CybereasonBlogTemplate16</image:caption><image:title>CybereasonBlogTemplate16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_516034087.jpg</image:loc><image:caption>shutterstock516034087</image:caption><image:title>shutterstock516034087</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/solarwinds-update-blog-card.png</image:loc><image:caption>solarwindsupdateblogcard</image:caption><image:title>solarwindsupdateblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(27).png</image:loc><image:caption>CybereasonBlogTemplate27</image:caption><image:title>CybereasonBlogTemplate27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(26)-2.png</image:loc><image:caption>CybereasonBlogTemplate262</image:caption><image:title>CybereasonBlogTemplate262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/holiday-sale-blog-a.png</image:loc><image:caption>holidaysalebloga</image:caption><image:title>holidaysalebloga</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Privacy-day-blog-2.png</image:loc><image:caption>Privacydayblog2</image:caption><image:title>Privacydayblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/heart-of-cyber-darkness.png</image:loc><image:caption>heartofcyberdarkness</image:caption><image:title>heartofcyberdarkness</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV_Image.jpg</image:loc><image:caption>NGAVImage</image:caption><image:title>NGAVImage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/636247599789125010-1013090754_Uber-pic-1.jpg</image:loc><image:caption>6362475997891250101013090754Uberpic1</image:caption><image:title>6362475997891250101013090754Uberpic1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Nocturnus/images/nocturnus-hero.jpg</image:loc><image:caption>nocturnushero</image:caption><image:title>nocturnushero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/more-money-solarwinds-blog-card.png</image:loc><image:caption>moremoneysolarwindsblogcard</image:caption><image:title>moremoneysolarwindsblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ghost-in-the-Machine-Hero.png</image:loc><image:caption>GhostintheMachineHero</image:caption><image:title>GhostintheMachineHero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Remote-Work-Laptop-Banner.png</image:loc><image:caption>RemoteWorkLaptopBanner</image:caption><image:title>RemoteWorkLaptopBanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_355734296.jpg</image:loc><image:caption>shutterstock355734296</image:caption><image:title>shutterstock355734296</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybersecurity-government-shutdown.jpg</image:loc><image:caption>cybersecuritygovernmentshutdown</image:caption><image:title>cybersecuritygovernmentshutdown</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EU-Flag-Privacy-Shield-Blog.png</image:loc><image:caption>EUFlagPrivacyShieldBlog</image:caption><image:title>EUFlagPrivacyShieldBlog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sky-Dark-Blue-CAM.png</image:loc><image:caption>SkyDarkBlueCAM</image:caption><image:title>SkyDarkBlueCAM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/solarwind-russia-hack-blog-card-1.png</image:loc><image:caption>solarwindrussiahackblogcard1</image:caption><image:title>solarwindrussiahackblogcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(22).png</image:loc><image:caption>CybereasonBlogTemplate22</image:caption><image:title>CybereasonBlogTemplate22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-1090973498.png</image:loc><image:caption>GettyImages1090973498</image:caption><image:title>GettyImages1090973498</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ransomware-blog-hero.jpg</image:loc><image:caption>Ransomwarebloghero</image:caption><image:title>Ransomwarebloghero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(35).png</image:loc><image:caption>CybereasonBlogTemplate35</image:caption><image:title>CybereasonBlogTemplate35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(3).png</image:loc><image:caption>CybereasonBlogtemplate3</image:caption><image:title>CybereasonBlogtemplate3</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cryptocurrency-mining-attacks-using-leaked-nsa-hacking-tools-are-still-highly-active-a-year-later</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechCrunch%20logo-1.png</image:loc><image:caption>TechCrunchlogo1</image:caption><image:title>TechCrunchlogo1</image:title></image:image><lastmod>2018-09-24</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-joins-mitre-engenuitys-center-for-threat-informed-defense</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-06-02</lastmod></url><url><loc>https://www.cybereason.com/blog/rsa-conference-2023-promises-new-concepts-diversity-of-ideas</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/smartest-cybersecurity-minds-2024-blog-featured.png</image:loc><image:caption>smartestcybersecurityminds2024blogfeatured</image:caption><image:title>smartestcybersecurityminds2024blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/soc-modernization-blog-featured.png</image:loc><image:caption>socmodernizationblogfeatured</image:caption><image:title>socmodernizationblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RSA%20Conference.png</image:loc><image:caption>RSAConference</image:caption><image:title>RSAConference</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2023-01-17</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-windows-10-leak-lets-attackers-study-os-for-vulnerabilities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/goot-loader-blog-featured.png</image:loc><image:caption>gootloaderblogfeatured</image:caption><image:title>gootloaderblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_666229957.jpg</image:loc><image:caption>shutterstock666229957</image:caption><image:title>shutterstock666229957</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat-Alert-GootLoader-SEO-Poisoning.png</image:loc><image:caption>ThreatAlertGootLoaderSEOPoisoning</image:caption><image:title>ThreatAlertGootLoaderSEOPoisoning</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-24</lastmod></url><url><loc>https://www.cybereason.com/services/bundles/cybereason-managed</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/Mib-mobile.png</image:loc><image:caption>Mibmobile</image:caption><image:title>Mibmobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/mdr-datasheet-cover.png</image:loc><image:caption>mdrdatasheetcover</image:caption><image:title>mdrdatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-08-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/access-to-70000-hacked-servers-sold-on-hacker-marketplace-industry-reacts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinas-microsoft-hack-russias-solarwinds-attack-threaten-to-overwhelm-u.s</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bloomberg%20News%20logo.png</image:loc><image:caption>BloombergNewslogo</image:caption><image:title>BloombergNewslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-03-10</lastmod></url><url><loc>https://www.cybereason.com/company/careers/product-and-engineering</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-respondor-gold-8k--full-wing-transparent.png</image:loc><image:caption>crrespondorgold8kfullwingtransparent</image:caption><image:title>crrespondorgold8kfullwingtransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/barak-nagar--headshot-550px.png</image:loc><image:caption>baraknagarheadshot550px</image:caption><image:title>baraknagarheadshot550px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/hadar-harari--headshot-550px.jpeg</image:loc><image:caption>hadarharariheadshot550px</image:caption><image:title>hadarharariheadshot550px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/dani-koretsky--headshot-550px.jpeg</image:loc><image:caption>danikoretskyheadshot550px</image:caption><image:title>danikoretskyheadshot550px</image:title></image:image><lastmod>2022-09-20</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-analysis-report-socgholish-and-zloader-from-fake-updates-and-installers-to-owning-your-systems</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image10-1.jpg</image:loc><image:caption>image101</image:caption><image:title>image101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image8-Apr-22-2022-07-18-11-61-PM.png</image:loc><image:caption>image8Apr22202207181161PM</image:caption><image:title>image8Apr22202207181161PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Apr-22-2022-07-36-54-98-PM.png</image:loc><image:caption>image5Apr22202207365498PM</image:caption><image:title>image5Apr22202207365498PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image14-Apr-22-2022-07-22-31-22-PM.png</image:loc><image:caption>image14Apr22202207223122PM</image:caption><image:title>image14Apr22202207223122PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-2.jpg</image:loc><image:caption>image22</image:caption><image:title>image22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image16-1.jpg</image:loc><image:caption>image161</image:caption><image:title>image161</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Apr-22-2022-07-28-25-58-PM.png</image:loc><image:caption>image4Apr22202207282558PM</image:caption><image:title>image4Apr22202207282558PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image18-1.jpg</image:loc><image:caption>image181</image:caption><image:title>image181</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-1.jpg</image:loc><image:caption>image131</image:caption><image:title>image131</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Apr-22-2022-07-31-36-66-PM.png</image:loc><image:caption>image6Apr22202207313666PM</image:caption><image:title>image6Apr22202207313666PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Apr-22-2022-07-39-37-49-PM.png</image:loc><image:caption>image1Apr22202207393749PM</image:caption><image:title>image1Apr22202207393749PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image21-Apr-22-2022-07-34-33-44-PM.png</image:loc><image:caption>image21Apr22202207343344PM</image:caption><image:title>image21Apr22202207343344PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image15-Apr-22-2022-07-30-35-09-PM.png</image:loc><image:caption>image15Apr22202207303509PM</image:caption><image:title>image15Apr22202207303509PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19.jpg</image:loc><image:caption>image19</image:caption><image:title>image19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Apr-22-2022-07-19-36-74-PM.jpg</image:loc><image:caption>image11Apr22202207193674PM</image:caption><image:title>image11Apr22202207193674PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Apr-22-2022-07-20-20-99-PM.png</image:loc><image:caption>image12Apr22202207202099PM</image:caption><image:title>image12Apr22202207202099PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image17-Apr-22-2022-07-29-38-41-PM.png</image:loc><image:caption>image17Apr22202207293841PM</image:caption><image:title>image17Apr22202207293841PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(84).png</image:loc><image:caption>blogposttext84</image:caption><image:title>blogposttext84</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Apr-22-2022-07-21-34-79-PM.png</image:loc><image:caption>image3Apr22202207213479PM</image:caption><image:title>image3Apr22202207213479PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Apr-22-2022-07-26-20-97-PM.png</image:loc><image:caption>image7Apr22202207262097PM</image:caption><image:title>image7Apr22202207262097PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image20-Apr-22-2022-07-33-36-72-PM.png</image:loc><image:caption>image20Apr22202207333672PM</image:caption><image:title>image20Apr22202207333672PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-1.jpg</image:loc><image:caption>image91</image:caption><image:title>image91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(5).png</image:loc><image:caption>ThreatAlerttemplate5</image:caption><image:title>ThreatAlerttemplate5</image:title></image:image><lastmod>2022-06-03</lastmod></url><url><loc>https://www.cybereason.com/partners/resale-partners</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/gamechangers-cr-icons-set-newyellow-4-mono-03.svg</image:loc><image:caption>gamechangerscriconssetnewyellow4mono03</image:caption><image:title>gamechangerscriconssetnewyellow4mono03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-wing.png</image:loc><image:caption>crbgherobluesubtlewithwing</image:caption><image:title>crbgherobluesubtlewithwing</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/partner-program-guide-24-cover.png</image:loc><image:caption>partnerprogramguide24cover</image:caption><image:title>partnerprogramguide24cover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/CR_ICONS_MONO-02.svg</image:loc><image:caption>CRICONSMONO02</image:caption><image:title>CRICONSMONO02</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/CR_ICONS_MONO-37.svg</image:loc><image:caption>CRICONSMONO37</image:caption><image:title>CRICONSMONO37</image:title></image:image><lastmod>2025-06-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/was-the-ny-stock-exchange-attacked-by-super-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/TTOI.jpg</image:loc><image:caption>TTOI</image:caption><image:title>TTOI</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/in-focus-how-ready-is-singapore-for-a-major-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/channel-news-asia-logo.jpg</image:loc><image:caption>channelnewsasialogo</image:caption><image:title>channelnewsasialogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-07-27</lastmod></url><url><loc>https://www.cybereason.com/blog/esg-research-report-2021-trends-in-endpoint-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/alert-fatigue-the-silent-epidemic-featured-blog.png</image:loc><image:caption>alertfatiguethesilentepidemicfeaturedblog</image:caption><image:title>alertfatiguethesilentepidemicfeaturedblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(13).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews13</image:caption><image:title>CopyofBLOGSOCIALSETNews13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(71).png</image:loc><image:caption>blogposttext71</image:caption><image:title>blogposttext71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-3.png</image:loc><image:caption>Capture3</image:caption><image:title>Capture3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-08-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-is-darkside-russia-linked-hacker-group-behind-colonial-pipeline-shutdown</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsweek%20logo.png</image:loc><image:caption>Newsweeklogo</image:caption><image:title>Newsweeklogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-05-12</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-named-to-ai-100</loc><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/NGAV_Image.jpg</image:loc><image:caption>NGAVImage</image:caption><image:title>NGAVImage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(26)-2.png</image:loc><image:caption>CybereasonBlogTemplate262</image:caption><image:title>CybereasonBlogTemplate262</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(5).png</image:loc><image:caption>ImagefromiOS5</image:caption><image:title>ImagefromiOS5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2017-12-20</lastmod></url><url><loc>https://www.cybereason.com/press/built-in-boston-names-cybereason-a-company-to-watch-in-2017</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-05</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-december-1st-ransomware-attackers-dont-take-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(77).png</image:loc><image:caption>blogposttext77</image:caption><image:title>blogposttext77</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(23).png</image:loc><image:caption>CybereasonBlogTemplate23</image:caption><image:title>CybereasonBlogTemplate23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/maggie-macalpine.png</image:loc><image:caption>maggiemacalpine</image:caption><image:title>maggiemacalpine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jj-cranford-author.png</image:loc><image:caption>jjcranfordauthor</image:caption><image:title>jjcranfordauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><lastmod>2021-11-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-auto-scanning-and-scripting-helped-exchange-attackers-rack-up-victims</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Mar-10-2021-12-15-08-37-AM.png</image:loc><image:caption>SCMagazinelogoMar10202112150837AM</image:caption><image:title>SCMagazinelogoMar10202112150837AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-03-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/final-thoughts-on-the-rsa-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/esg.jpg</image:loc><image:caption>esg</image:caption><image:title>esg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/threat-attackers-can-own-your-data-in-just-two-days</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo-Jan-23-2023-06-46-05-7605-PM.png</image:loc><image:caption>TechRepubliclogoJan2320230646057605PM</image:caption><image:title>TechRepubliclogoJan2320230646057605PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2023-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/2025-predictions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/2025%20PREDICTIONS%20BY%20GREG%20DAY.jpg</image:loc><image:caption>2025PREDICTIONSBYGREGDAY</image:caption><image:title>2025PREDICTIONSBYGREGDAY</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/smartest-cybersecurity-minds-2024-blog-featured.png</image:loc><image:caption>smartestcybersecurityminds2024blogfeatured</image:caption><image:title>smartestcybersecurityminds2024blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/Cybersecurity-Capability-Industry-Nearly-Forgot.png</image:loc><image:caption>CybersecurityCapabilityIndustryNearlyForgot</image:caption><image:title>CybersecurityCapabilityIndustryNearlyForgot</image:title></image:image><lastmod>2024-12-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/https/www.ibtimes.sg/beware-hackers-using-new-amazon-gift-card-scam-infect-devices-banking-malware-54473</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/International%20Business%20Times%20logo.png</image:loc><image:caption>InternationalBusinessTimeslogo</image:caption><image:title>InternationalBusinessTimeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-01-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sam-curry-interviewed-on-china-and-privatized-hacking-operations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CRN-TV1.jpg</image:loc><image:caption>CRNTV1</image:caption><image:title>CRNTV1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/it-doesnt-pay-to-pay-study-finds-eighty-percent-of-ransomware-victims-attacked-again</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo-Jun-10-2022-02-09-16-43-AM.jpg</image:loc><image:caption>SecurityWeeklogoJun10202202091643AM</image:caption><image:title>SecurityWeeklogoJun10202202091643AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-06-10</lastmod></url><url><loc>https://www.cybereason.com/resources/us-eu-privacy-shield-dissolution-panel-webinar</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Privacy-Shield-On-Demand-LI.png</image:loc><image:caption>PrivacyShieldOnDemandLI</image:caption><image:title>PrivacyShieldOnDemandLI</image:title></image:image><lastmod>2020-09-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/as-internet-spoofing-gets-better-you-may-surf-into-a-sea-of-sharks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/McClatchy%20News-1.jpg</image:loc><image:caption>McClatchyNews1</image:caption><image:title>McClatchyNews1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-08-16</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-the-mitre-corporation-to-educate-companies-how-to-use-mitre-attck-threat-intel-to-defend-against-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-jeff-moss-on-the-history-of-def-con</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(28).png</image:loc><image:caption>MaliciousLifeepisode28</image:caption><image:title>MaliciousLifeepisode28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Jeff%20Moss.jpg</image:loc><image:caption>JeffMoss</image:caption><image:title>JeffMoss</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(7).png</image:loc><image:caption>Maliciouslifepodcast7</image:caption><image:title>Maliciouslifepodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/117%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>117MALICIOUSLIFE</image:caption><image:title>117MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sam-curry-interview</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Data-Breach-Today-logo.png</image:loc><image:caption>DataBreachTodaylogo</image:caption><image:title>DataBreachTodaylogo</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/what-are-supply-chain-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/3CXDesktopApp.png</image:loc><image:caption>3CXDesktopApp</image:caption><image:title>3CXDesktopApp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130836.455.png</image:loc><image:caption>blogposttext20220926T130836455</image:caption><image:title>blogposttext20220926T130836455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Forrester-Cybereason-Webinar-Combined-10-14-FINAL2-960x391.jpg</image:loc><image:caption>ForresterCybereasonWebinarCombined1014FINAL2960x391</image:caption><image:title>ForresterCybereasonWebinarCombined1014FINAL2960x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2018-05-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-using-bumblebee-loader-to-compromise-active-directory-services</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Hacker%20News%20logo-3.jpg</image:loc><image:caption>TheHackerNewslogo3</image:caption><image:title>TheHackerNewslogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-08-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/us-conflict-with-iran-sparks-cybersecurity-concerns</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Data%20Breach%20Today%20logo-2.png</image:loc><image:caption>DataBreachTodaylogo2</image:caption><image:title>DataBreachTodaylogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-01-14</lastmod></url><url><loc>https://www.cybereason.com/threat-alert-valak</loc><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/threat-alert-hero-bg.jpg</image:loc><image:caption>threatalertherobg</image:caption><image:title>threatalertherobg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Partner-Page-Icons-03.png</image:loc><image:caption>PartnerPageIcons03</image:caption><image:title>PartnerPageIcons03</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-attack-goal.png</image:loc><image:caption>criconattackgoal</image:caption><image:title>criconattackgoal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/antivirus-01.png</image:loc><image:caption>antivirus01</image:caption><image:title>antivirus01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-threat-type.png</image:loc><image:caption>criconthreattype</image:caption><image:title>criconthreattype</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/YELLOW_THREAT_ALERT_CR_ICONS-53.svg</image:loc><image:caption>YELLOWTHREATALERTCRICONS53</image:caption><image:title>YELLOWTHREATALERTCRICONS53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/icons-all/Asset%203.png</image:loc><image:caption>Asset3</image:caption><image:title>Asset3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-remediate-disable.png</image:loc><image:caption>criconremediatedisable</image:caption><image:title>criconremediatedisable</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/threat-alerts/cr-icon-impacted-geo.png</image:loc><image:caption>criconimpactedgeo</image:caption><image:title>criconimpactedgeo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-11-02</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-what-the-linkedin-hack-taught-us-about-storing-passwords</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(9).png</image:loc><image:caption>MaliciousLifeepisode9</image:caption><image:title>MaliciousLifeepisode9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(27).png</image:loc><image:caption>MaliciousLifeepisode27</image:caption><image:title>MaliciousLifeepisode27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(21).png</image:loc><image:caption>MaliciousLifeepisode21</image:caption><image:title>MaliciousLifeepisode21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2023-07-18</lastmod></url><url><loc>https://www.cybereason.com/blog/308-roi-by-using-cybereason-according-to-forrester-total-economic-impact-study</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(81).png</image:loc><image:caption>blogposttext81</image:caption><image:title>blogposttext81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/nuspire.jpg</image:loc><image:caption>nuspire</image:caption><image:title>nuspire</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/abstract-vector-lines-B1.jpg</image:loc><image:caption>abstractvectorlinesB1</image:caption><image:title>abstractvectorlinesB1</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/urgent-warning-for-all-facebook-users-you-need-to-change-these-settings-today</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20Sun%20logo-3.png</image:loc><image:caption>TheSunlogo3</image:caption><image:title>TheSunlogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-10-20</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-is-nso-evil-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(7).png</image:loc><image:caption>Maliciouslifepodcast7</image:caption><image:title>Maliciouslifepodcast7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><lastmod>2024-01-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sam-curry-discusses-the-importance-of-public-and-private-sector-innovation-with-teri-robinson</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine-9.png</image:loc><image:caption>SCMagazine9</image:caption><image:title>SCMagazine9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2019-03-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-101-what-banks-can-do-to-mitigate-risk</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ABA%20Banking%20Journal%20logo.gif</image:loc><image:caption>ABABankingJournallogo</image:caption><image:title>ABABankingJournallogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-07-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-have-gone-automated-so-should-your-cybersecurity-defense</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityBoulevard.jpg</image:loc><image:caption>SecurityBoulevard</image:caption><image:title>SecurityBoulevard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2018-05-02</lastmod></url><url><loc>https://www.cybereason.com/resources/webinar-the-future-of-endpoint-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20Webinar%20(2).png</image:loc><image:caption>CopyofBLOGSOCIALSETWebinar2</image:caption><image:title>CopyofBLOGSOCIALSETWebinar2</image:title></image:image><lastmod>2021-10-21</lastmod></url><url><loc>https://www.cybereason.com/blog/aa-rated-advanced-endpoint-protection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-june-2nd-2022-live-attack-simulation-ransomware-threat-hunter-series</loc><image:image><image:loc>https://www.cybereason.com/hubfs/israel-hex-hs2.png</image:loc><image:caption>israelhexhs2</image:caption><image:title>israelhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(102).png</image:loc><image:caption>blogposttext102</image:caption><image:title>blogposttext102</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94).png</image:loc><image:caption>blogposttext94</image:caption><image:title>blogposttext94</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(7).png</image:loc><image:caption>blogposttext7</image:caption><image:title>blogposttext7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Headshot%20image%20template%20(6).png</image:loc><image:caption>CopyofHeadshotimagetemplate6</image:caption><image:title>CopyofHeadshotimagetemplate6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jj-hex-hs2.png</image:loc><image:caption>jjhexhs2</image:caption><image:title>jjhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-05-16</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-mitre-engenuity-center-for-threat-informed-defense-announce-launch-of-the-attack-flow-project</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-03-03</lastmod></url><url><loc>https://www.cybereason.com/blog/international-womens-day-defenders-share-advice-on-how-to-breakthebias</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20Sibel%20Narin-Farooq.png</image:loc><image:caption>EmployeeSpotlightSibelNarinFarooq</image:caption><image:title>EmployeeSpotlightSibelNarinFarooq</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(38).png</image:loc><image:caption>blogposttext38</image:caption><image:title>blogposttext38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(25).png</image:loc><image:caption>blogposttext25</image:caption><image:title>blogposttext25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-05-25</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-fujitsu-limited-partner-to-resell-its-deep-hunting-platform-to-detect-cyber-attacks-in-realtime</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-11-16</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/boost-your-security-get-it-and-hr-to-collaborate</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CSO.png</image:loc><image:caption>CSO</image:caption><image:title>CSO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-crypto-ag-part-2-the-death-of-bo-jr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(5).png</image:loc><image:caption>Maliciouslifepodcast5</image:caption><image:title>Maliciouslifepodcast5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/sony-bmg-rootkit-ep-218.png</image:loc><image:caption>sonybmgrootkitep218</image:caption><image:title>sonybmgrootkitep218</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-02-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/uber-reveals-cover-up-of-hack-affecting-57m-riders-drivers-4</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/new-york-times-logo.jpg</image:loc><image:caption>newyorktimeslogo</image:caption><image:title>newyorktimeslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-12</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-announces-private-infrastructure-protection-version-21.2</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/private-infrastructure-protection-version-21-2.mp4/medium.jpg</video:thumbnail_loc><video:title>private-infrastructure-protection-version-21-2</video:title><video:description>private-infrastructure-protection-version-21-2</video:description><video:content_loc>https://www.cybereason.com/hubfs/private-infrastructure-protection-version-21-2.mp4</video:content_loc><video:duration>292</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-1.png</image:loc><image:caption>CybereasonBlogTemplate31</image:caption><image:title>CybereasonBlogTemplate31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Asaf-Hotnik.png</image:loc><image:caption>AsafHotnik</image:caption><image:title>AsafHotnik</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T131959.309.png</image:loc><image:caption>blogposttext20220926T131959309</image:caption><image:title>blogposttext20220926T131959309</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20advances%20prevention%20data%20collection.png</image:loc><image:caption>Cybereasonadvancespreventiondatacollection</image:caption><image:title>Cybereasonadvancespreventiondatacollection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hey-tech-startups-dont-knit-a-security-patchwork-quilt</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/UKTN.jpg</image:loc><image:caption>UKTN</image:caption><image:title>UKTN</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2018-03-29</lastmod></url><url><loc>https://www.cybereason.com/company/careers/general-and-administrative</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sibel--headshot-550px.jpeg</image:loc><image:caption>sibelheadshot550px</image:caption><image:title>sibelheadshot550px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/owls/cr-respondor-gold-8k--full-wing-transparent.png</image:loc><image:caption>crrespondorgold8kfullwingtransparent</image:caption><image:title>crrespondorgold8kfullwingtransparent</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Lily-Wang.png</image:loc><image:caption>LilyWang</image:caption><image:title>LilyWang</image:title></image:image><lastmod>2022-09-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-get-10000-in-bitcoin-after-attack-on-leominster-schools</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/boston-globe-logo.jpg</image:loc><image:caption>bostonglobelogo</image:caption><image:title>bostonglobelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-05-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/coronavirus-pandemic-delays-urgently-needed-action-on-us-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/silicon%20angle%20logo.png</image:loc><image:caption>siliconanglelogo</image:caption><image:title>siliconanglelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-04-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hackers-can-use-your-household-appliances-to-trigger-large-scale-power-outages</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fortune-MAgazine-Logo.jpg</image:loc><image:caption>FortuneMAgazineLogo</image:caption><image:title>FortuneMAgazineLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2018-11-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/triton-industrial-malware-group-still-active-researchers-warn</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CW_Logo-hero-2.jpg</image:loc><image:caption>CWLogohero2</image:caption><image:title>CWLogohero2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2019-04-26</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cybereason-ciso-interview-series-taking-acceptable-risk-for-acceptable-return</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_656336884.jpg</image:loc><image:caption>shutterstock656336884</image:caption><image:title>shutterstock656336884</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(9).png</image:loc><image:caption>CISOStoriestemplate9</image:caption><image:title>CISOStoriestemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/cisostories</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-blog-card-2.png</image:loc><image:caption>cisostoriesblogcard2</image:caption><image:title>cisostoriesblogcard2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><lastmod>2021-03-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/an-update-on-the-evolution-of-lockbit-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CyberSec%20Asia%20logo-2.png</image:loc><image:caption>CyberSecAsialogo2</image:caption><image:title>CyberSecAsialogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/blog/attackers-pick-targets-based-on-the-payout-not-which-companies-are-easy-to-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(36).png</image:loc><image:caption>CybereasonBlogTemplate36</image:caption><image:title>CybereasonBlogTemplate36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-xdr-data-management.png</image:loc><image:caption>cybereasonxdrdatamanagement</image:caption><image:title>cybereasonxdrdatamanagement</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Money-Hero-V1.png</image:loc><image:caption>MoneyHeroV1</image:caption><image:title>MoneyHeroV1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-02-02</lastmod></url><url><loc>https://www.cybereason.com/blog/impact-of-xdr-on-the-modern-soc-new-esg-report</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ESG-XDR-Cover.png</image:loc><image:caption>ESGXDRCover</image:caption><image:title>ESGXDRCover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/esg-xdr-hero-01.png</image:loc><image:caption>esgxdrhero01</image:caption><image:title>esgxdrhero01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/esg-xdr-blog-2.png</image:loc><image:caption>esgxdrblog2</image:caption><image:title>esgxdrblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/xdr-hub-for-threat-detection-1.png</image:loc><image:caption>xdrhubforthreatdetection1</image:caption><image:title>xdrhubforthreatdetection1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(9).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews9</image:caption><image:title>CopyofBLOGSOCIALSETNews9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/complex-attack-xdr-3.png</image:loc><image:caption>complexattackxdr3</image:caption><image:title>complexattackxdr3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eric-sun-hs.jpg</image:loc><image:caption>ericsunhs</image:caption><image:title>ericsunhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/start-with-cloud-xdr-2.png</image:loc><image:caption>startwithcloudxdr2</image:caption><image:title>startwithcloudxdr2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(48).png</image:loc><image:caption>blogposttext48</image:caption><image:title>blogposttext48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/esg-xdr-blog-6.gif</image:loc><image:caption>esgxdrblog6</image:caption><image:title>esgxdrblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-uncovers-middle-east-malware-attack-via-facebook-and-dropbox</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Calcalist%20logo.png</image:loc><image:caption>Calcalistlogo</image:caption><image:title>Calcalistlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-12-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/solarwinds-related-cyberattacks-pose-grave-risk-to-government-and-private-sector</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo-1.png</image:loc><image:caption>TechRepubliclogo1</image:caption><image:title>TechRepubliclogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/black-basta-using-qbot-malware-to-target-us-based-companies-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Dec-12-2022-04-56-23-0107-PM.png</image:loc><image:caption>BankinfosecuritylogoDec1220220456230107PM</image:caption><image:title>BankinfosecuritylogoDec1220220456230107PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-12-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-suspected-in-man-united-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-4.png</image:loc><image:caption>InfosecurityMagazinelogo4</image:caption><image:title>InfosecurityMagazinelogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-aaron-swartz-story</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5).png</image:loc><image:caption>MaliciousLifeepisode5</image:caption><image:title>MaliciousLifeepisode5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-238-card.png</image:loc><image:caption>mlep238card</image:caption><image:title>mlep238card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-04-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/doj-launches-task-force-to-battle-ransomware-threat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-Apr-23-2021-01-53-21-63-AM.png</image:loc><image:caption>BankinfosecuritylogoApr23202101532163AM</image:caption><image:title>BankinfosecuritylogoApr23202101532163AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/more-money-wont-prevent-the-next-solarwinds-but-better-detection-strategies-will</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/more-money-solarwinds-blog-card.png</image:loc><image:caption>moremoneysolarwindsblogcard</image:caption><image:title>moremoneysolarwindsblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-25T141451.987.png</image:loc><image:caption>blogposttext20220725T141451987</image:caption><image:title>blogposttext20220725T141451987</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-responding-to-a-cyber-attack-with-missiles</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/1200px-Ben-israel-1.jpeg</image:loc><image:caption>1200pxBenisrael1</image:caption><image:title>1200pxBenisrael1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/53%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>53MALICIOUSLIFE</image:caption><image:title>53MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Mikko-Hypponen.jpeg</image:loc><image:caption>MikkoHypponen</image:caption><image:title>MikkoHypponen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-237-card.png</image:loc><image:caption>mlep237card</image:caption><image:title>mlep237card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/north-korean-group-kimsuky-targets-government-agencies-with-new-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Security%20Week%20logo-4.png</image:loc><image:caption>SecurityWeeklogo4</image:caption><image:title>SecurityWeeklogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-11-16</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereasons-ciso-israel-barak-to-deliver-keynote-address-at-infosecurity-north-america-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/employee-spotlight-why-people-are-key-to-cybereason-success</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(25).png</image:loc><image:caption>blogposttext25</image:caption><image:title>blogposttext25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tim%20Weiss.png</image:loc><image:caption>TimWeiss</image:caption><image:title>TimWeiss</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20tim%20weiss.png</image:loc><image:caption>EmployeeSpotlighttimweiss</image:caption><image:title>EmployeeSpotlighttimweiss</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logo.png</image:loc><image:caption>CybereasonLogo</image:caption><image:title>CybereasonLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Employee%20Spotlight%20_%20Sibel%20Narin-Farooq.png</image:loc><image:caption>EmployeeSpotlightSibelNarinFarooq</image:caption><image:title>EmployeeSpotlightSibelNarinFarooq</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><lastmod>2022-05-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/palestinians-targeted-by-gazan-hackers-as-researchers-unearth-mysterious-new-backdoor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/forbes-logo-9.gif</image:loc><image:caption>forbeslogo9</image:caption><image:title>forbeslogo9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2020-02-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/windows-autopatch-issued-to-close-possible-vulnerabilities-to-zero-day-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bankinfosecurity%20logo-May-09-2022-03-29-08-58-PM.png</image:loc><image:caption>BankinfosecuritylogoMay09202203290858PM</image:caption><image:title>BankinfosecuritylogoMay09202203290858PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-the-importance-of-xdr-in-cloud-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(9).png</image:loc><image:caption>blogposttext9</image:caption><image:title>blogposttext9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-12T072834.369-1.png</image:loc><image:caption>blogposttext20221012T0728343691</image:caption><image:title>blogposttext20221012T0728343691</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(15).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews15</image:caption><image:title>CopyofBLOGSOCIALSETNews15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2023-02-10</lastmod></url><url><loc>https://www.cybereason.com/blog/rsa-2025-key-submissions-trends</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/RSA%20Conference.png</image:loc><image:caption>RSAConference</image:caption><image:title>RSAConference</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(5).png</image:loc><image:caption>BLOGImagesTemplatev25</image:caption><image:title>BLOGImagesTemplatev25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/2024-Cybersecurity-Predictions%20-%20Generative-GD-Featured.png</image:loc><image:caption>2024CybersecurityPredictionsGenerativeGDFeatured</image:caption><image:title>2024CybersecurityPredictionsGenerativeGDFeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><lastmod>2025-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/container-escape-all-you-need-is-cap-capabilities</loc><image:image><image:loc>https://www.cybereason.com/hubfs/image12-Oct-03-2022-07-26-16-50-PM.png</image:loc><image:caption>image12Oct03202207261650PM</image:caption><image:title>image12Oct03202207261650PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image9-Oct-03-2022-07-22-02-62-PM.png</image:loc><image:caption>image9Oct03202207220262PM</image:caption><image:title>image9Oct03202207220262PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image11-Oct-03-2022-07-16-33-33-PM.png</image:loc><image:caption>image11Oct03202207163333PM</image:caption><image:title>image11Oct03202207163333PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Oct-03-2022-07-24-09-08-PM.png</image:loc><image:caption>image4Oct03202207240908PM</image:caption><image:title>image4Oct03202207240908PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image13-Oct-03-2022-07-30-02-48-PM.png</image:loc><image:caption>image13Oct03202207300248PM</image:caption><image:title>image13Oct03202207300248PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Oct-03-2022-07-25-07-20-PM.png</image:loc><image:caption>image1Oct03202207250720PM</image:caption><image:title>image1Oct03202207250720PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(7)-1.png</image:loc><image:caption>image71</image:caption><image:title>image71</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Oct-03-2022-07-31-24-45-PM.png</image:loc><image:caption>image6Oct03202207312445PM</image:caption><image:title>image6Oct03202207312445PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Oct-03-2022-07-18-07-40-PM.png</image:loc><image:caption>image3Oct03202207180740PM</image:caption><image:title>image3Oct03202207180740PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T072637.791.png</image:loc><image:caption>blogposttext20221005T072637791</image:caption><image:title>blogposttext20221005T072637791</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(8).png</image:loc><image:caption>blogposttext8</image:caption><image:title>blogposttext8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Oct-03-2022-07-27-57-10-PM.png</image:loc><image:caption>image2Oct03202207275710PM</image:caption><image:title>image2Oct03202207275710PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Oct-03-2022-07-27-13-30-PM.png</image:loc><image:caption>image5Oct03202207271330PM</image:caption><image:title>image5Oct03202207271330PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Oct-03-2022-07-30-47-74-PM.png</image:loc><image:caption>image7Oct03202207304774PM</image:caption><image:title>image7Oct03202207304774PM</image:title></image:image><lastmod>2023-04-10</lastmod></url><url><loc>https://www.cybereason.com/blog/xdr-for-cloud-workloads-a-new-approach-to-cloud-security</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T072315.427.png</image:loc><image:caption>blogposttext20220913T072315427</image:caption><image:title>blogposttext20220913T072315427</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-2.jpg</image:loc><image:caption>image12</image:caption><image:title>image12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(8).png</image:loc><image:caption>blogposttext8</image:caption><image:title>blogposttext8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/XDR-for-cloud-workloads.png</image:loc><image:caption>XDRforcloudworkloads</image:caption><image:title>XDRforcloudworkloads</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-04-21</lastmod></url><url><loc>https://www.cybereason.com/blog/what-are-domain-generation-algorithms-dga</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DGA1.jpg</image:loc><image:caption>DGA1</image:caption><image:title>DGA1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DGA3.jpg</image:loc><image:caption>DGA3</image:caption><image:title>DGA3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Eight%20DGA%20Variants.jpg</image:loc><image:caption>EightDGAVariants</image:caption><image:title>EightDGAVariants</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(11).png</image:loc><image:caption>BLOGImagesTemplatev211</image:caption><image:title>BLOGImagesTemplatev211</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/DGA2.jpg</image:loc><image:caption>DGA2</image:caption><image:title>DGA2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(105)-1.png</image:loc><image:caption>blogposttext1051</image:caption><image:title>blogposttext1051</image:title></image:image><lastmod>2021-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/2025-mitre-attck-enterprise-evaluation</loc><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(21).png</image:loc><image:caption>BLOGImagesTemplatev221</image:caption><image:title>BLOGImagesTemplatev221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Blog-detections.png</image:loc><image:caption>MITREBlogdetections</image:caption><image:title>MITREBlogdetections</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Cybereason%20Logo-1.png</image:loc><image:caption>CybereasonLogo1</image:caption><image:title>CybereasonLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/From%20Scripts%20to%20Systems-%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations/BLOG_Images_Template_v2%20(28).png</image:loc><image:caption>BLOGImagesTemplatev228</image:caption><image:title>BLOGImagesTemplatev228</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Blog-SOCAlerts.png</image:loc><image:caption>MITREBlogSOCAlerts</image:caption><image:title>MITREBlogSOCAlerts</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Blog-Protection.png</image:loc><image:caption>MITREBlogProtection</image:caption><image:title>MITREBlogProtection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MITRE-Blog-1-1.png</image:loc><image:caption>MITREBlog11</image:caption><image:title>MITREBlog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Mitre%20Blog%202026.png</image:loc><image:caption>CybereasonMitreBlog2026</image:caption><image:title>CybereasonMitreBlog2026</image:title></image:image><lastmod>2026-01-07</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fauxpersky-keylogger-malware-stealing-passwords-from-windows-pcs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/hackread.png</image:loc><image:caption>hackread</image:caption><image:title>hackread</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-03-29</lastmod></url><url><loc>https://www.cybereason.com/blog/machine-timeline-enhancements-improve-investigation-workflows</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/figure2.png</image:loc><image:caption>figure2</image:caption><image:title>figure2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/figure1.png</image:loc><image:caption>figure1</image:caption><image:title>figure1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/machine-timeline-enhancements.png</image:loc><image:caption>machinetimelineenhancements</image:caption><image:title>machinetimelineenhancements</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/figure4.png</image:loc><image:caption>figure4</image:caption><image:title>figure4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/figure3.png</image:loc><image:caption>figure3</image:caption><image:title>figure3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/headshot.jpeg</image:loc><image:caption>headshot</image:caption><image:title>headshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(119).png</image:loc><image:caption>blogposttext119</image:caption><image:title>blogposttext119</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><lastmod>2022-11-01</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-study-paints-organizational-risk-from-ransomware-attacks-during-weekends-and-holidays</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-17</lastmod></url><url><loc>https://www.cybereason.com/resources/one-two-punch-emotet-trickbot-and-ryuk-steal-then-ransom-data</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-suggested-images/lh6.googleusercontent.comafT2AGzVc61_bA-KQF4g0tHcwjhXpXH6IY0lLsF_Tqwmon-7Zxf_Y6PI55MI1tc7Bk64HKusnG1E4ugxAGsRWIbaZuqJYFHaMUiZ66e0aJ3PzmqLE0P7XXXfHb5.png</image:loc><image:caption>lh6googleusercontentcomafT2AGzVc61bAKQF4g0tHcwjhXpXH6IY0lLsFTqwmon7ZxfY6PI55MI1tc7Bk64HKusnG1E4ugxAGsRWIbaZuqJYFHaMUiZ66e0aJ3PzmqLE0P7XXXfHb5</image:caption><image:title>lh6googleusercontentcomafT2AGzVc61bAKQF4g0tHcwjhXpXH6IY0lLsFTqwmon7ZxfY6PI55MI1tc7Bk64HKusnG1E4ugxAGsRWIbaZuqJYFHaMUiZ66e0aJ3PzmqLE0P7XXXfHb5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-04-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/android-malware-alert-eventbot-targeting-financial-banking-apps</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Android%20Headlines%20logo.png</image:loc><image:caption>AndroidHeadlineslogo</image:caption><image:title>AndroidHeadlineslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-05-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-10-hottest-products-from-black-hat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN%20logo-Aug-17-2022-04-28-42-67-PM.png</image:loc><image:caption>CRNlogoAug17202204284267PM</image:caption><image:title>CRNlogoAug17202204284267PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-08-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/avoiding-ransomware-in-2017</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Total-Retail.png</image:loc><image:caption>TotalRetail</image:caption><image:title>TotalRetail</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/why-a-cloud-native-epp-is-critical-for-futureproof-security-operations</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog-Cloud-Native-EPP-B.png</image:loc><image:caption>BlogCloudNativeEPPB</image:caption><image:title>BlogCloudNativeEPPB</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Headshot%20(1)-1.jpg</image:loc><image:caption>Headshot11</image:caption><image:title>Headshot11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(11).png</image:loc><image:caption>blogposttext11</image:caption><image:title>blogposttext11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(32)-1.png</image:loc><image:caption>CybereasonBlogTemplate321</image:caption><image:title>CybereasonBlogTemplate321</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/malware-author-inflates-backdoor-trojan-with-junk-data-hoping-to-avoid-detection</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Bleeping-Computer1.png</image:loc><image:caption>BleepingComputer1</image:caption><image:title>BleepingComputer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/wannacry-is-the-ransomware-attack-we-should-have-been-ready-for</loc><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/eWeek.png</image:loc><image:caption>eWeek</image:caption><image:title>eWeek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cybereason-creates-vaccine-to-stop-remcos-rat</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Screen-Shot-2017-08-10-at-4.01.25-PM.png</image:loc><image:caption>ScreenShot20170810at40125PM</image:caption><image:title>ScreenShot20170810at40125PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Stellar-Discovery_v2.png</image:loc><image:caption>BLOGStellarDiscoveryv2</image:caption><image:title>BLOGStellarDiscoveryv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Imported_Blog_Media/Pasted-image-at-2017_08_10-04_25-PM.png</image:loc><image:caption>Pastedimageat201708100425PM</image:caption><image:title>Pastedimageat201708100425PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-42.jpg</image:loc><image:caption>Untitleddesign42</image:caption><image:title>Untitleddesign42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Screen-Shot-2017-08-10-at-3.46.35-PM.png</image:loc><image:caption>ScreenShot20170810at34635PM</image:caption><image:title>ScreenShot20170810at34635PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/whats-next-in-the-evolution-of-complex-ransomops</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(27).png</image:loc><image:caption>blogposttext27</image:caption><image:title>blogposttext27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware.png</image:loc><image:caption>ransomware</image:caption><image:title>ransomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-1.png</image:loc><image:caption>CybereasonBlogTemplate201</image:caption><image:title>CybereasonBlogTemplate201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-03-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-military-grade-threat-hunting-experts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CIO-Review-Logo-800x511.jpg</image:loc><image:caption>CIOReviewLogo800x511</image:caption><image:title>CIOReviewLogo800x511</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-issues-highly-severe-advisory-warning-for-global-organizations-against-black-basta-gang</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Enterprise%20Channels%20MEA%20logo.png</image:loc><image:caption>EnterpriseChannelsMEAlogo</image:caption><image:title>EnterpriseChannelsMEAlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2022-07-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/end-of-emotet-a-blow-to-cyber-crime-but-dont-drop-your-guard</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-Feb-04-2021-02-26-48-58-PM.png</image:loc><image:caption>ComputerWeeklylogoFeb04202102264858PM</image:caption><image:title>ComputerWeeklylogoFeb04202102264858PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-02-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/new-cybereason-mdr-mobile-app-allows-for-remote-response-to-security-threats</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Silicon%20Angle%20logo-1.png</image:loc><image:caption>SiliconAnglelogo1</image:caption><image:title>SiliconAnglelogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-08-17</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-and-doosan-corp-partner-to-secure-apac-enterprises</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/%EB%B3%B4%EB%8F%84%EC%9E%90%EB%A3%8C_%EC%9D%B4%EB%AF%B8%EC%A7%801.png</image:loc><image:caption>보도자료이미지1</image:caption><image:title>보도자료이미지1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ip-theft-declining-or-just-more-stealthy-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CSO.png</image:loc><image:caption>CSO</image:caption><image:title>CSO</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/trio-of-hacking-clusters-targeting-telcos-traced-back-to-chinese-state-espionage</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-Aug-04-2021-05-44-14-18-PM.png</image:loc><image:caption>SCMagazinelogoAug04202105441418PM</image:caption><image:title>SCMagazinelogoAug04202105441418PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2021-08-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomware-gangs-get-paid-off-as-officials-struggle-for-fix</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Associated%20Press%20logo-1.png</image:loc><image:caption>AssociatedPresslogo1</image:caption><image:title>AssociatedPresslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-06-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fbi-calls-attention-to-bec-scams</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN-Logo.png</image:loc><image:caption>CRNLogo</image:caption><image:title>CRNLogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2018-07-18</lastmod></url><url><loc>https://www.cybereason.com/blog/research/eventbot-a-new-mobile-banking-trojan-is-born</loc><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-11.png</image:loc><image:caption>EventBot11</image:caption><image:title>EventBot11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-6.png</image:loc><image:caption>EventBot6</image:caption><image:title>EventBot6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-29.png</image:loc><image:caption>EventBot29</image:caption><image:title>EventBot29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-3a.png</image:loc><image:caption>EventBot3a</image:caption><image:title>EventBot3a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-9.png</image:loc><image:caption>EventBot9</image:caption><image:title>EventBot9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-24.png</image:loc><image:caption>EventBot24</image:caption><image:title>EventBot24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-16.png</image:loc><image:caption>EventBot16</image:caption><image:title>EventBot16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-22.png</image:loc><image:caption>EventBot22</image:caption><image:title>EventBot22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-14.png</image:loc><image:caption>EventBot14</image:caption><image:title>EventBot14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-23.png</image:loc><image:caption>EventBot23</image:caption><image:title>EventBot23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-26.png</image:loc><image:caption>EventBot26</image:caption><image:title>EventBot26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-23a.png</image:loc><image:caption>EventBot23a</image:caption><image:title>EventBot23a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-29a.png</image:loc><image:caption>EventBot29a</image:caption><image:title>EventBot29a</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-32.png</image:loc><image:caption>EventBot32</image:caption><image:title>EventBot32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-2.png</image:loc><image:caption>EventBot2</image:caption><image:title>EventBot2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-20.png</image:loc><image:caption>EventBot20</image:caption><image:title>EventBot20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-15.png</image:loc><image:caption>EventBot15</image:caption><image:title>EventBot15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-3b.png</image:loc><image:caption>EventBot3b</image:caption><image:title>EventBot3b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-4.png</image:loc><image:caption>EventBot4</image:caption><image:title>EventBot4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-3c.png</image:loc><image:caption>EventBot3c</image:caption><image:title>EventBot3c</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-3d.png</image:loc><image:caption>EventBot3d</image:caption><image:title>EventBot3d</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-21.png</image:loc><image:caption>EventBot21</image:caption><image:title>EventBot21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-29e.png</image:loc><image:caption>EventBot29e</image:caption><image:title>EventBot29e</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-25.png</image:loc><image:caption>EventBot25</image:caption><image:title>EventBot25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-13.png</image:loc><image:caption>EventBot13</image:caption><image:title>EventBot13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-8.png</image:loc><image:caption>EventBot8</image:caption><image:title>EventBot8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-18.png</image:loc><image:caption>EventBot18</image:caption><image:title>EventBot18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image29b.png</image:loc><image:caption>image29b</image:caption><image:title>image29b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-2-10.png</image:loc><image:caption>EventBot210</image:caption><image:title>EventBot210</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-5.png</image:loc><image:caption>EventBot5</image:caption><image:title>EventBot5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-30-2.png</image:loc><image:caption>EventBot302</image:caption><image:title>EventBot302</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(69).png</image:loc><image:caption>blogposttext69</image:caption><image:title>blogposttext69</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-7.png</image:loc><image:caption>EventBot7</image:caption><image:title>EventBot7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-17.png</image:loc><image:caption>EventBot17</image:caption><image:title>EventBot17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-29d.png</image:loc><image:caption>EventBot29d</image:caption><image:title>EventBot29d</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-10.png</image:loc><image:caption>EventBot10</image:caption><image:title>EventBot10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-28.png</image:loc><image:caption>EventBot28</image:caption><image:title>EventBot28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-19.png</image:loc><image:caption>EventBot19</image:caption><image:title>EventBot19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(88).png</image:loc><image:caption>blogposttext88</image:caption><image:title>blogposttext88</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-1.png</image:loc><image:caption>EventBot1</image:caption><image:title>EventBot1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mobile-eventbot-hero-A.png</image:loc><image:caption>mobileeventbotheroA</image:caption><image:title>mobileeventbotheroA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-31.png</image:loc><image:caption>EventBot31</image:caption><image:title>EventBot31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-12.png</image:loc><image:caption>EventBot12</image:caption><image:title>EventBot12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-27.png</image:loc><image:caption>EventBot27</image:caption><image:title>EventBot27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EventBot-33.png</image:loc><image:caption>EventBot33</image:caption><image:title>EventBot33</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-named-a-top-disruptive-innovator-by-juniper-research</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/blog/how-threat-hunting-enhances-incident-response</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_241801279.jpg</image:loc><image:caption>shutterstock241801279</image:caption><image:title>shutterstock241801279</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cloud-detection-sysdig-featured-image.png</image:loc><image:caption>clouddetectionsysdigfeaturedimage</image:caption><image:title>clouddetectionsysdigfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-06T065715.064.png</image:loc><image:caption>blogposttext20221006T065715064</image:caption><image:title>blogposttext20221006T065715064</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-01-02</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/out-of-hours-ransomware-attacks-have-a-greater-impact-on-revenue</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITPro%20logo-3.png</image:loc><image:caption>ITPrologo3</image:caption><image:title>ITPrologo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-11-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/darkside-is-behind-colonial-pipeline-cyberattack-fbi-says.-what-to-know-about-group</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/McClatchy%20News%20logo.png</image:loc><image:caption>McClatchyNewslogo</image:caption><image:title>McClatchyNewslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-05-10</lastmod></url><url><loc>https://www.cybereason.com/blog/ten-of-the-biggest-ransomware-attacks-of-2021</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(1)-2.png</image:loc><image:caption>CybereasonBlogTemplate12</image:caption><image:title>CybereasonBlogTemplate12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-20T064817.923.png</image:loc><image:caption>blogposttext20220720T064817923</image:caption><image:title>blogposttext20220720T064817923</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10biggest.png</image:loc><image:caption>10biggest</image:caption><image:title>10biggest</image:title></image:image><lastmod>2022-05-26</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-launches-its-global-partner-program</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/telcos-the-supply-chain-attack-youre-not-ready-for</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085148.693.png</image:loc><image:caption>blogposttext20221018T085148693</image:caption><image:title>blogposttext20221018T085148693</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-02T070344.027.png</image:loc><image:caption>blogposttext20220802T070344027</image:caption><image:title>blogposttext20220802T070344027</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(85).png</image:loc><image:caption>blogposttext85</image:caption><image:title>blogposttext85</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2022-10-18</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-targets-june-5-to-carry-out-multi-stage-global-cyber-attacks-from-infosecurity-europe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-06-06</lastmod></url><url><loc>https://www.cybereason.com/resources/webinar-extend-protection-to-cloud-workloads</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR%20or%20XDR%20card-1.png</image:loc><image:caption>EDRorXDRcard1</image:caption><image:title>EDRorXDRcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cwpp-webinar-featured-image.png</image:loc><image:caption>cwppwebinarfeaturedimage</image:caption><image:title>cwppwebinarfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-03-22</lastmod></url><url><loc>https://www.cybereason.com/blog/excel4.0-macros-now-with-twice-the-bits</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(3).png</image:loc><image:caption>MaliciousLifeTemplate3</image:caption><image:title>MaliciousLifeTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/phil.jpg</image:loc><image:caption>phil</image:caption><image:title>phil</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(20)-2.png</image:loc><image:caption>CybereasonBlogTemplate202</image:caption><image:title>CybereasonBlogTemplate202</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image%20(5)-2.png</image:loc><image:caption>image52</image:caption><image:title>image52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/press-releases/boston-mayor-walsh-visits-cybereasons-office-in-boston</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-11-20</lastmod></url><url><loc>https://www.cybereason.com/blog/soc-modernization-measures-and-metrics-for-success</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(79).png</image:loc><image:caption>blogposttext79</image:caption><image:title>blogposttext79</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(37)-1.png</image:loc><image:caption>blogposttext371</image:caption><image:title>blogposttext371</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/smartest-cybersecurity-minds-2024-blog-featured.png</image:loc><image:caption>smartestcybersecurityminds2024blogfeatured</image:caption><image:title>smartestcybersecurityminds2024blogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_1135.jpg</image:loc><image:caption>IMG1135</image:caption><image:title>IMG1135</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-04-14</lastmod></url><url><loc>https://www.cybereason.com/blog/research/valak-more-than-meets-the-eye</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-Hero-5.png</image:loc><image:caption>ValakHero5</image:caption><image:title>ValakHero5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-36.png</image:loc><image:caption>Valak36</image:caption><image:title>Valak36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-50.png</image:loc><image:caption>Valak50</image:caption><image:title>Valak50</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-17.png</image:loc><image:caption>Valak17</image:caption><image:title>Valak17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-47.png</image:loc><image:caption>Valak47</image:caption><image:title>Valak47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-40.png</image:loc><image:caption>Valak40</image:caption><image:title>Valak40</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-33.png</image:loc><image:caption>Valak33</image:caption><image:title>Valak33</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/valak-6.png</image:loc><image:caption>valak6</image:caption><image:title>valak6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-56.png</image:loc><image:caption>Valak56</image:caption><image:title>Valak56</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/valak-4.gif</image:loc><image:caption>valak4</image:caption><image:title>valak4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-44.png</image:loc><image:caption>Valak44</image:caption><image:title>Valak44</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-32.png</image:loc><image:caption>Valak32</image:caption><image:title>Valak32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-29.png</image:loc><image:caption>Valak29</image:caption><image:title>Valak29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-26.png</image:loc><image:caption>Valak26</image:caption><image:title>Valak26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-28.png</image:loc><image:caption>Valak28</image:caption><image:title>Valak28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-19.png</image:loc><image:caption>Valak19</image:caption><image:title>Valak19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-42.png</image:loc><image:caption>Valak42</image:caption><image:title>Valak42</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-35.png</image:loc><image:caption>Valak35</image:caption><image:title>Valak35</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-15.png</image:loc><image:caption>Valak15</image:caption><image:title>Valak15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-22.png</image:loc><image:caption>Valak22</image:caption><image:title>Valak22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-14.png</image:loc><image:caption>Valak14</image:caption><image:title>Valak14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/valak-8.png</image:loc><image:caption>valak8</image:caption><image:title>valak8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-23.png</image:loc><image:caption>Valak23</image:caption><image:title>Valak23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/valak-11.png</image:loc><image:caption>valak11</image:caption><image:title>valak11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/valak-1.png</image:loc><image:caption>valak1</image:caption><image:title>valak1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/valak-10.png</image:loc><image:caption>valak10</image:caption><image:title>valak10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-30.png</image:loc><image:caption>Valak30</image:caption><image:title>Valak30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-53.png</image:loc><image:caption>Valak53</image:caption><image:title>Valak53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-18.png</image:loc><image:caption>Valak18</image:caption><image:title>Valak18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-46-1.png</image:loc><image:caption>Valak461</image:caption><image:title>Valak461</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/valak-12.png</image:loc><image:caption>valak12</image:caption><image:title>valak12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-41.png</image:loc><image:caption>Valak41</image:caption><image:title>Valak41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/valak-2.png</image:loc><image:caption>valak2</image:caption><image:title>valak2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-13.png</image:loc><image:caption>Valak13</image:caption><image:title>Valak13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-38.png</image:loc><image:caption>Valak38</image:caption><image:title>Valak38</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-24.png</image:loc><image:caption>Valak24</image:caption><image:title>Valak24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/valak-3.png</image:loc><image:caption>valak3</image:caption><image:title>valak3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-39.png</image:loc><image:caption>Valak39</image:caption><image:title>Valak39</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-51.png</image:loc><image:caption>Valak51</image:caption><image:title>Valak51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-20.png</image:loc><image:caption>Valak20</image:caption><image:title>Valak20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-31.png</image:loc><image:caption>Valak31</image:caption><image:title>Valak31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-21.png</image:loc><image:caption>Valak21</image:caption><image:title>Valak21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/valak-7.png</image:loc><image:caption>valak7</image:caption><image:title>valak7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-49.png</image:loc><image:caption>Valak49</image:caption><image:title>Valak49</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-16.gif</image:loc><image:caption>Valak16</image:caption><image:title>Valak16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-45.png</image:loc><image:caption>Valak45</image:caption><image:title>Valak45</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-55.png</image:loc><image:caption>Valak55</image:caption><image:title>Valak55</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-25.png</image:loc><image:caption>Valak25</image:caption><image:title>Valak25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-34.png</image:loc><image:caption>Valak34</image:caption><image:title>Valak34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/valak-5.png</image:loc><image:caption>valak5</image:caption><image:title>valak5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-43.png</image:loc><image:caption>Valak43</image:caption><image:title>Valak43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-46.png</image:loc><image:caption>Valak46</image:caption><image:title>Valak46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-54.png</image:loc><image:caption>Valak54</image:caption><image:title>Valak54</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-27.png</image:loc><image:caption>Valak27</image:caption><image:title>Valak27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Valak-48.png</image:loc><image:caption>Valak48</image:caption><image:title>Valak48</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/qa-cybersecurity-machine-learning-and-the-nation-state</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer-Business-Review%20logo.jpg</image:loc><image:caption>ComputerBusinessReviewlogo</image:caption><image:title>ComputerBusinessReviewlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-07-24</lastmod></url><url><loc>https://www.cybereason.com/blog/ttp-briefing-q4-2025</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q4_2025/redacted_calendar_phish2.png</image:loc><image:caption>redactedcalendarphish2</image:caption><image:title>redactedcalendarphish2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q4_2025/BLOG_Images_Template_v2%20(38).png</image:loc><image:caption>BLOGImagesTemplatev238</image:caption><image:title>BLOGImagesTemplatev238</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q4_2025/Charts/RAT%20trend%20line%20q4.png</image:loc><image:caption>RATtrendlineq4</image:caption><image:title>RATtrendlineq4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Jan%20-%20May%202025/Intrusion%20Path.png</image:loc><image:caption>IntrusionPath</image:caption><image:title>IntrusionPath</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q4_2025/Charts/incident%20type%20mom%20q4.png</image:loc><image:caption>incidenttypemomq4</image:caption><image:title>incidenttypemomq4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q4_2025/Charts/MFA%20bypass%20q4.png</image:loc><image:caption>MFAbypassq4</image:caption><image:title>MFAbypassq4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q4_2025/Charts/dwell%20time%20q4.png</image:loc><image:caption>dwelltimeq4</image:caption><image:title>dwelltimeq4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q4_2025/Charts/IIV%20mom%20q4.png</image:loc><image:caption>IIVmomq4</image:caption><image:title>IIVmomq4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/TTP_Briefing/Q4_2025/Charts/industry%20mom%20q4.png</image:loc><image:caption>industrymomq4</image:caption><image:title>industrymomq4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(23).png</image:loc><image:caption>BLOGImagesTemplatev223</image:caption><image:title>BLOGImagesTemplatev223</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/citrixbleed-featured-image.png</image:loc><image:caption>citrixbleedfeaturedimage</image:caption><image:title>citrixbleedfeaturedimage</image:title></image:image><lastmod>2026-02-05</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-alert-n3tw0rm-ransomware-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-09-58-53-47-PM.png</image:loc><image:caption>unnamedSep14202109585347PM</image:caption><image:title>unnamedSep14202109585347PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-09-55-28-49-PM.png</image:loc><image:caption>unnamedSep14202109552849PM</image:caption><image:title>unnamedSep14202109552849PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-09-53-39-27-PM.png</image:loc><image:caption>unnamedSep14202109533927PM</image:caption><image:title>unnamedSep14202109533927PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-53-53-18-PM.png</image:loc><image:caption>unnamedSep14202108535318PM</image:caption><image:title>unnamedSep14202108535318PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20Threat%20AlertAnalysis%20(2).png</image:loc><image:caption>CopyofThreatAlertAnalysis2</image:caption><image:title>CopyofThreatAlertAnalysis2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-Sep-14-2021-09-51-26-86-PM.png</image:loc><image:caption>CaptureSep14202109512686PM</image:caption><image:title>CaptureSep14202109512686PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-08-55-30-03-PM.png</image:loc><image:caption>unnamedSep14202108553003PM</image:caption><image:title>unnamedSep14202108553003PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-21T133543.854.png</image:loc><image:caption>blogposttext20220621T133543854</image:caption><image:title>blogposttext20220621T133543854</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/unnamed-Sep-14-2021-09-57-04-99-PM.png</image:loc><image:caption>unnamedSep14202109570499PM</image:caption><image:title>unnamedSep14202109570499PM</image:title></image:image><lastmod>2022-04-11</lastmod></url><url><loc>https://www.cybereason.com/solarwinds-supply-chain-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/solarwinds-resources-card-A.png</image:loc><image:caption>solarwindsresourcescardA</image:caption><image:title>solarwindsresourcescardA</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/xdr-malop-2-investigation.gif</image:loc><image:caption>xdrmalop2investigation</image:caption><image:title>xdrmalop2investigation</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ML-solarwinds.png</image:loc><image:caption>MLsolarwinds</image:caption><image:title>MLsolarwinds</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sam-Curry-CB2021.png</image:loc><image:caption>SamCurryCB2021</image:caption><image:title>SamCurryCB2021</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/solarwinds-update-blog-card.png</image:loc><image:caption>solarwindsupdateblogcard</image:caption><image:title>solarwindsupdateblogcard</image:title></image:image><lastmod>2021-02-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/breach-of-security-start-up-verkada-reportedly-exposes-150000-cameras</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/The%20National%20(Middle%20East)%20logo-1.png</image:loc><image:caption>TheNationalMiddleEastlogo1</image:caption><image:title>TheNationalMiddleEastlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-03-10</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-chief-security-officer-sam-curry-headlines-two-talks-at-the-2019-rsa-conference</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-02-28</lastmod></url><url><loc>https://www.cybereason.com/blog/panelists-look-at-the-factors-behind-the-uptick-in-nation-state-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20&amp;%20Hero%20Template.png</image:loc><image:caption>CybereasonBlogHeroTemplate</image:caption><image:title>CybereasonBlogHeroTemplate</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Jordan%20Bowen.png</image:loc><image:caption>JordanBowen</image:caption><image:title>JordanBowen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Blog-Post_Header_Nation-State.png</image:loc><image:caption>BlogPostHeaderNationState</image:caption><image:title>BlogPostHeaderNationState</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(107).png</image:loc><image:caption>blogposttext107</image:caption><image:title>blogposttext107</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/sam-curry-interview-with-tom-fields-of-ismg</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Data%20Breach%20Today%20logo-3.png</image:loc><image:caption>DataBreachTodaylogo3</image:caption><image:title>DataBreachTodaylogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-03-02</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-announces-300-percent-revenue-growth-</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-06-14</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-protecting-the-crown-jewels</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Jul-19-2021-09-09-49-63-AM.png</image:loc><image:caption>CISOStoriestemplateJul19202109094963AM</image:caption><image:title>CISOStoriestemplateJul19202109094963AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(8)-1.png</image:loc><image:caption>pastedimage081</image:caption><image:title>pastedimage081</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/remote-is-the-new-norm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ITProPortal-Logo-for-FB-300x157.jpg</image:loc><image:caption>ITProPortalLogoforFB300x157</image:caption><image:title>ITProPortalLogoforFB300x157</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-04-13</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-prevention-vs.-recovery-which-costs-businesses-more</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(5).png</image:loc><image:caption>blogposttext5</image:caption><image:title>blogposttext5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(44).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews44</image:caption><image:title>CopyofBLOGSOCIALSETNews44</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(75).png</image:loc><image:caption>blogposttext75</image:caption><image:title>blogposttext75</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/services/deployment-and-training</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/platform-bg-shape-sm.png</image:loc><image:caption>platformbgshapesm</image:caption><image:title>platformbgshapesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ServiceSubPageHeader3.png</image:loc><image:caption>ServiceSubPageHeader3</image:caption><image:title>ServiceSubPageHeader3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-04-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/facebook-unintentionally-imported-email-contacts-of-over-1.5-million-users</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Teiss%20Logo-3.jpg</image:loc><image:caption>TeissLogo3</image:caption><image:title>TeissLogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2019-04-26</lastmod></url><url><loc>https://www.cybereason.com/blog/ever-evolving-stephanie-ihezukwu-on-managing-security-remotely</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Stephanie-Ihezukwu.png</image:loc><image:caption>StephanieIhezukwu</image:caption><image:title>StephanieIhezukwu</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/Stephanie%20Ihezukwu%20Card.png</image:loc><image:caption>StephanieIhezukwuCard</image:caption><image:title>StephanieIhezukwuCard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-names-ck-chim-field-chief-security-officer-to-accelerate-expansion-in-asia-pacific-region</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-12-09</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-expands-middle-east-and-north-africa-presence-with-dubais-oxygen</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/dubai-oxygen-blog-card.png</image:loc><image:caption>dubaioxygenblogcard</image:caption><image:title>dubaioxygenblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-08-26</lastmod></url><url><loc>https://www.cybereason.com/press/securema-coalition-briefing-featured-fbi-boston</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2018-06-21</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/securing-iot-connected-devices</loc><image:image><image:loc>https://www.cybereason.com/hubfs/WSJ-CIO%20Journal%20Logo-1.jpg</image:loc><image:caption>WSJCIOJournalLogo1</image:caption><image:title>WSJCIOJournalLogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2018-11-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/preparing-for-the-fifth-generation-of-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-Jan-23-2023-06-25-37-2101-PM.png</image:loc><image:caption>DatabreachtodaylogoJan2320230625372101PM</image:caption><image:title>DatabreachtodaylogoJan2320230625372101PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2023-01-23</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-why-do-apts-use-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(8).png</image:loc><image:caption>MaliciousLifeepisode8</image:caption><image:title>MaliciousLifeepisode8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/AssafDahan.jpg</image:loc><image:caption>AssafDahan</image:caption><image:title>AssafDahan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(4).png</image:loc><image:caption>Maliciouslifepodcast4</image:caption><image:title>Maliciouslifepodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-02-22</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-practical-considerations-for-managing-your-mssp</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(2)-1.png</image:loc><image:caption>CISOStoriestemplate21</image:caption><image:title>CISOStoriestemplate21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(3)-1.png</image:loc><image:caption>CISOStoriestemplate31</image:caption><image:title>CISOStoriestemplate31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(5)-1.png</image:loc><image:caption>CISOStoriestemplate51</image:caption><image:title>CISOStoriestemplate51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/JonathanNguyenDuy-0.jpeg</image:loc><image:caption>JonathanNguyenDuy0</image:caption><image:title>JonathanNguyenDuy0</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><lastmod>2021-11-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/industry-reactions-to-u.s.-indicting-12-russians-for-dnc-hack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/securityweek-2.png</image:loc><image:caption>securityweek2</image:caption><image:title>securityweek2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-07-25</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-jerusalem-virus-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/37%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>37MALICIOUSLIFE</image:caption><image:title>37MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/140%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>140MALICIOUSLIFE1</image:caption><image:title>140MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yuval%20Rakavy.jpeg</image:loc><image:caption>YuvalRakavy</image:caption><image:title>YuvalRakavy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-235-card.png</image:loc><image:caption>mlep235card</image:caption><image:title>mlep235card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/resources/five-clear-steps-to-enhance-secops-with-mitre-attack-0</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Satellite_City_1920x1080-2.jpg</image:loc><image:caption>SatelliteCity1920x10802</image:caption><image:title>SatelliteCity1920x10802</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><lastmod>2020-08-04</lastmod></url><url><loc>https://www.cybereason.com/press/the-quick-and-the-dead</loc><image:image><image:loc>https://www.cybereason.com/hubfs/francesco-lo-giudice-788861-unsplash%20(1).jpeg</image:loc><image:caption>francescologiudice788861unsplash1</image:caption><image:title>francescologiudice788861unsplash1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2019-08-06</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ransomfree-is-a-great-idea.-its-free-go-ahead-and-install-it</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/PC-Magazine.png</image:loc><image:caption>PCMagazine</image:caption><image:title>PCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-macos-not-as-secure-as-you-think</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Sarah%20Maloney.jpg</image:loc><image:caption>SarahMaloney</image:caption><image:title>SarahMaloney</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/mac-blog-header.jpg</image:loc><image:caption>macblogheader</image:caption><image:title>macblogheader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/nfts-disappear-mlbside-ep-207.png</image:loc><image:caption>nftsdisappearmlbsideep207</image:caption><image:title>nftsdisappearmlbsideep207</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(4).png</image:loc><image:caption>Maliciouslifepodcast4</image:caption><image:title>Maliciouslifepodcast4</image:title></image:image><lastmod>2018-01-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-named-the-fastest-growing-security-company</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Untitled-design-9-1.jpg</image:loc><image:caption>Untitleddesign91</image:caption><image:title>Untitleddesign91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fancy-bear-resumes-olympic-hacks-ahead-of-tokyo-games</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ComputerWeekly.png</image:loc><image:caption>ComputerWeekly</image:caption><image:title>ComputerWeekly</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2019-11-05</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/israel-barak</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_552355456-1.jpg</image:loc><image:caption>shutterstock5523554561</image:caption><image:title>shutterstock5523554561</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_101436343-1000x391.jpg</image:loc><image:caption>shutterstock1014363431000x391</image:caption><image:title>shutterstock1014363431000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_443899843.jpg</image:loc><image:caption>shutterstock443899843</image:caption><image:title>shutterstock443899843</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Aerial_Road.jpg</image:loc><image:caption>AerialRoad</image:caption><image:title>AerialRoad</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_490628485.jpg</image:loc><image:caption>shutterstock490628485</image:caption><image:title>shutterstock490628485</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_194315417.jpg</image:loc><image:caption>shutterstock194315417</image:caption><image:title>shutterstock194315417</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Behavioral-Intelligence-2.jpg</image:loc><image:caption>BehavioralIntelligence2</image:caption><image:title>BehavioralIntelligence2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/israel-author.png</image:loc><image:caption>israelauthor</image:caption><image:title>israelauthor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_222798229.jpg</image:loc><image:caption>shutterstock222798229</image:caption><image:title>shutterstock222798229</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_365531273.jpg</image:loc><image:caption>shutterstock365531273</image:caption><image:title>shutterstock365531273</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ransomware-honeypot-blog.jpg</image:loc><image:caption>ransomwarehoneypotblog</image:caption><image:title>ransomwarehoneypotblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Electric-blog-1.png</image:loc><image:caption>Electricblog1</image:caption><image:title>Electricblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Images%20-%20Labs/xdedic_feature.jpg</image:loc><image:caption>xdedicfeature</image:caption><image:title>xdedicfeature</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/services/compromise-assessment</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/iconsand.png</image:loc><image:caption>iconsand</image:caption><image:title>iconsand</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-icon--black.svg</image:loc><image:caption>crlogoiconblack</image:caption><image:title>crlogoiconblack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PROTECT_ENTERPRISE_CR_ICONS-08.png</image:loc><image:caption>PROTECTENTERPRISECRICONS08</image:caption><image:title>PROTECTENTERPRISECRICONS08</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Edometer_4-03-03%209.36.03%20AM.png</image:loc><image:caption>Edometer4030393603AM</image:caption><image:title>Edometer4030393603AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/IR_Service_v1_thumbnail-min.png</image:loc><image:caption>IRServicev1thumbnailmin</image:caption><image:title>IRServicev1thumbnailmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-platform-spine-bg--posture-incident-management-d.jpg</image:loc><image:caption>crplatformspinebgpostureincidentmanagementd</image:caption><image:title>crplatformspinebgpostureincidentmanagementd</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/NETWORK_ARCHITECTURE_CR_ICONS_BATCH_2%20copy-20.svg</image:loc><image:caption>NETWORKARCHITECTURECRICONSBATCH2copy20</image:caption><image:title>NETWORKARCHITECTURECRICONSBATCH2copy20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/IR%20Response/Compromise_Datasheet_Thumbnail-min.png</image:loc><image:caption>CompromiseDatasheetThumbnailmin</image:caption><image:title>CompromiseDatasheetThumbnailmin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--platform-02-gradient.jpg</image:loc><image:caption>crbgheroplatform02gradient</image:caption><image:title>crbgheroplatform02gradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--platform-01-gradient.jpg</image:loc><image:caption>crbgheroplatform01gradient</image:caption><image:title>crbgheroplatform01gradient</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/REALTIME_PROTECTION_MULTILAYERED_CR_ICONS-04.svg</image:loc><image:caption>REALTIMEPROTECTIONMULTILAYEREDCRICONS04</image:caption><image:title>REALTIMEPROTECTIONMULTILAYEREDCRICONS04</image:title></image:image><lastmod>2025-01-23</lastmod></url><url><loc>https://www.cybereason.com/careers/all-jobs</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-09-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/making-sense-of-the-chaos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20News%20Middle%20East%20logo.png</image:loc><image:caption>ComputerNewsMiddleEastlogo</image:caption><image:title>ComputerNewsMiddleEastlogo</image:title></image:image><lastmod>2020-12-07</lastmod></url><url><loc>https://www.cybereason.com/blog/nearly-one-third-of-attack-targets-werent-running-solarwinds</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(38)-1.png</image:loc><image:caption>CybereasonBlogTemplate381</image:caption><image:title>CybereasonBlogTemplate381</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog_automatingR.png</image:loc><image:caption>blogautomatingR</image:caption><image:title>blogautomatingR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post.png</image:loc><image:caption>blogpost</image:caption><image:title>blogpost</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/david%20bisson.png</image:loc><image:caption>davidbisson</image:caption><image:title>davidbisson</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-edr-protection-without-compromising-privacy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-221.jpg</image:loc><image:caption>Untitleddesign221</image:caption><image:title>Untitleddesign221</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085321.975.png</image:loc><image:caption>blogposttext20221018T085321975</image:caption><image:title>blogposttext20221018T085321975</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2.png</image:loc><image:caption>BLOGImagesTemplatev2</image:caption><image:title>BLOGImagesTemplatev2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/mobile-malware-at-a-consumer-and-enterprise-level-espionage</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mobile-phone-1875813_1920.jpg</image:loc><image:caption>mobilephone18758131920</image:caption><image:title>mobilephone18758131920</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(114).png</image:loc><image:caption>blogposttext114</image:caption><image:title>blogposttext114</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-29T100914.455.png</image:loc><image:caption>blogposttext20220929T100914455</image:caption><image:title>blogposttext20220929T100914455</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-declares-war-on-ransomware-as-part-of-national-consumer-protection-week</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-software-bill-of-materials-sbom</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Allan_Friedman.jpg</image:loc><image:caption>AllanFriedman</image:caption><image:title>AllanFriedman</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(4).png</image:loc><image:caption>MaliciousLifeepisode4</image:caption><image:title>MaliciousLifeepisode4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(25).png</image:loc><image:caption>MaliciousLifeepisode25</image:caption><image:title>MaliciousLifeepisode25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ChrisBlask.jpg</image:loc><image:caption>ChrisBlask</image:caption><image:title>ChrisBlask</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(3).png</image:loc><image:caption>MaliciousLifeTemplate3</image:caption><image:title>MaliciousLifeTemplate3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-08-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-80-percent-of-orgs-that-paid-the-ransom-were-hit-again</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/VentureBeat%20logo-1.png</image:loc><image:caption>VentureBeatlogo1</image:caption><image:title>VentureBeatlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-06-17</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-adds-two-women-to-its-senior-management-team</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2018-03-07</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-how-to-not-build-a-cybersecurity-startup</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-144.png</image:loc><image:caption>MaliciousLife144</image:caption><image:title>MaliciousLife144</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/How%20to%20Not%20Build%20a%20Cybersecurity%20Startup-1.png</image:loc><image:caption>HowtoNotBuildaCybersecurityStartup1</image:caption><image:title>HowtoNotBuildaCybersecurityStartup1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/134%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>134MALICIOUSLIFE1</image:caption><image:title>134MALICIOUSLIFE1</image:title></image:image><lastmod>2023-08-28</lastmod></url><url><loc>https://www.cybereason.com/blog/the-ciso-as-a-business-enabler</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Untitled%20design%20(5)%20(1).jpg</image:loc><image:caption>Untitleddesign51</image:caption><image:title>Untitleddesign51</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/David%20Bryant4650.jpg</image:loc><image:caption>DavidBryant4650</image:caption><image:title>DavidBryant4650</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(8).png</image:loc><image:caption>CISOStoriestemplate8</image:caption><image:title>CISOStoriestemplate8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template-Dec-24-2021-09-59-58-28-PM.png</image:loc><image:caption>CISOStoriestemplateDec24202109595828PM</image:caption><image:title>CISOStoriestemplateDec24202109595828PM</image:title></image:image><lastmod>2017-12-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/the-covid-19-pandemic-is-a-great-launching-pad-for-hackers-and-for-malicious-actors</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20Finance-3.jpg</image:loc><image:caption>YahooFinance3</image:caption><image:title>YahooFinance3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-04-28</lastmod></url><url><loc>https://www.cybereason.com/blog/ever-evolving-jake-williams-on-running-an-infosec-consultancy-remotely</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/jake-williams-hs.png</image:loc><image:caption>jakewilliamshs</image:caption><image:title>jakewilliamshs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(9).png</image:loc><image:caption>CISOStoriestemplate9</image:caption><image:title>CISOStoriestemplate9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jake-williams-card.png</image:loc><image:caption>jakewilliamscard</image:caption><image:title>jakewilliamscard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-06T130708.511.png</image:loc><image:caption>blogposttext20220706T130708511</image:caption><image:title>blogposttext20220706T130708511</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/drone-cybersecurity-policy-still-up-in-the-air</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Federal-Computer-Week.png</image:loc><image:caption>FederalComputerWeek</image:caption><image:title>FederalComputerWeek</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2018-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/blog-cybereason-ciso-sam-curry-fields-questions-on-what-it-takes-to-succeed-as-a-security-leader</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Untitled-design-37.jpg</image:loc><image:caption>Untitleddesign37</image:caption><image:title>Untitleddesign37</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(3)-2.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews32</image:caption><image:title>CopyofBLOGSOCIALSETNews32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(92).png</image:loc><image:caption>blogposttext92</image:caption><image:title>blogposttext92</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><lastmod>2018-03-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-and-intel-take-decisive-step-to-end-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-4.png</image:loc><image:caption>DarkReadinglogo4</image:caption><image:title>DarkReadinglogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-01-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-80-of-orgs-that-paid-the-ransom-were-hit-again</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Business%20Telegraph%20logo.png</image:loc><image:caption>BusinessTelegraphlogo</image:caption><image:title>BusinessTelegraphlogo</image:title></image:image><lastmod>2021-06-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/public-officials-struggle-to-put-an-end-to-ransom-payments-toward-cybercriminals</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fortune%20logo.png</image:loc><image:caption>Fortunelogo</image:caption><image:title>Fortunelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-06-22</lastmod></url><url><loc>https://www.cybereason.com/blog/best-endpoint-detection-response-edr-solutions</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(106).png</image:loc><image:caption>blogposttext106</image:caption><image:title>blogposttext106</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/bloggraphic-1024x391.png</image:loc><image:caption>bloggraphic1024x391</image:caption><image:title>bloggraphic1024x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2018-03-29</lastmod></url><url><loc>https://www.cybereason.com/resources/wannamine-cryptominer-that-uses-eternalblue-still-active</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-featured-image.png</image:loc><image:caption>crfeaturedimage</image:caption><image:title>crfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-07-19</lastmod></url><url><loc>https://www.cybereason.com/press/-cybereason-announces-securema</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2023-04-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecurity-goes-on-the-offensive</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/globes.png</image:loc><image:caption>globes</image:caption><image:title>globes</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2019-04-26</lastmod></url><url><loc>https://www.cybereason.com/blog/gartner-report-2021-competitive-landscape-for-endpoint-protection-platforms</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog_Gartner_EPP.png</image:loc><image:caption>BlogGartnerEPP</image:caption><image:title>BlogGartnerEPP</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Gartner-EPP-Comp.webp</image:loc><image:caption>GartnerEPPComp</image:caption><image:title>GartnerEPPComp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-09-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/more-malware-may-be-lurking-on-govt-school-laptops</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-Feb-04-2021-02-32-09-34-PM.png</image:loc><image:caption>InfosecurityMagazinelogoFeb04202102320934PM</image:caption><image:title>InfosecurityMagazinelogoFeb04202102320934PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2021-02-04</lastmod></url><url><loc>https://www.cybereason.com/press/mitre-attck-evaluation-highlights-cybereason-as-a-leader-in-edr-once-again</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/services/active-assist</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ServiceSubPageHeader3.png</image:loc><image:caption>ServiceSubPageHeader3</image:caption><image:title>ServiceSubPageHeader3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Award%20Logos/cr-nav-platform-cta-sm.png</image:loc><image:caption>crnavplatformctasm</image:caption><image:title>crnavplatformctasm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/platform-bg-shape-sm.png</image:loc><image:caption>platformbgshapesm</image:caption><image:title>platformbgshapesm</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2019-04-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/black-basta-gang-deploys-qakbot-malware-in-aggressive-cyber-campaign</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dark%20Reading%20logo-Dec-12-2022-05-08-35-2019-PM.png</image:loc><image:caption>DarkReadinglogoDec1220220508352019PM</image:caption><image:title>DarkReadinglogoDec1220220508352019PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2022-12-12</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/youve-got-mailware-new-fakespy-malware-targeting-royal-mail-users</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TEISS%20logo-1.png</image:loc><image:caption>TEISSlogo1</image:caption><image:title>TEISSlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-07-15</lastmod></url><url><loc>https://www.cybereason.com/blog/11-essential-controls</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/Icons/CR-Top-11-Controls-ILLUSTRATION_v05-05.png</image:loc><image:caption>CRTop11ControlsILLUSTRATIONv0505</image:caption><image:title>CRTop11ControlsILLUSTRATIONv0505</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/Icons/CR-Top-11-Controls-ILLUSTRATION_v05-12.png</image:loc><image:caption>CRTop11ControlsILLUSTRATIONv0512</image:caption><image:title>CRTop11ControlsILLUSTRATIONv0512</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/Icons/CR-Top-11-Controls-ILLUSTRATION_v05-09.png</image:loc><image:caption>CRTop11ControlsILLUSTRATIONv0509</image:caption><image:title>CRTop11ControlsILLUSTRATIONv0509</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/CR-TOP-11-CONTROLS-TEASER-with-names-editable.pptx%20(2).png</image:loc><image:caption>CRTOP11CONTROLSTEASERwithnameseditablepptx2</image:caption><image:title>CRTOP11CONTROLSTEASERwithnameseditablepptx2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/beast-ransomware-blog-featured.png</image:loc><image:caption>beastransomwareblogfeatured</image:caption><image:title>beastransomwareblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/Icons/CR-Top-11-Controls-ILLUSTRATION_v05-04.png</image:loc><image:caption>CRTop11ControlsILLUSTRATIONv0504</image:caption><image:title>CRTop11ControlsILLUSTRATIONv0504</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/Icons/CR-Top-11-Controls-ILLUSTRATION_v05-11.png</image:loc><image:caption>CRTop11ControlsILLUSTRATIONv0511</image:caption><image:title>CRTop11ControlsILLUSTRATIONv0511</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/Icons/CR-Top-11-Controls-ILLUSTRATION_v05-06.png</image:loc><image:caption>CRTop11ControlsILLUSTRATIONv0506</image:caption><image:title>CRTop11ControlsILLUSTRATIONv0506</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/Icons/CR-Top-11-Controls-ILLUSTRATION_v05-13.png</image:loc><image:caption>CRTop11ControlsILLUSTRATIONv0513</image:caption><image:title>CRTop11ControlsILLUSTRATIONv0513</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/Icons/CR-Top-11-Controls-ILLUSTRATION_v05-03.png</image:loc><image:caption>CRTop11ControlsILLUSTRATIONv0503</image:caption><image:title>CRTop11ControlsILLUSTRATIONv0503</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/Icons/CR-Top-11-Controls-ILLUSTRATION_v05-08.png</image:loc><image:caption>CRTop11ControlsILLUSTRATIONv0508</image:caption><image:title>CRTop11ControlsILLUSTRATIONv0508</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(18).png</image:loc><image:caption>CybereasonBlogTemplate18</image:caption><image:title>CybereasonBlogTemplate18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/Icons/CR-Top-11-Controls-ILLUSTRATION_v05-10.png</image:loc><image:caption>CRTop11ControlsILLUSTRATIONv0510</image:caption><image:title>CRTop11ControlsILLUSTRATIONv0510</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR-TOP-11-CONTROLS-web-images-BLOG-Opt.3-V02.png</image:loc><image:caption>CRTOP11CONTROLSwebimagesBLOGOpt3V02</image:caption><image:title>CRTOP11CONTROLSwebimagesBLOGOpt3V02</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Consulting/EssentialControls/Icons/CR-Top-11-Controls-ILLUSTRATION_v05-07.png</image:loc><image:caption>CRTop11ControlsILLUSTRATIONv0507</image:caption><image:title>CRTop11ControlsILLUSTRATIONv0507</image:title></image:image><lastmod>2025-11-07</lastmod></url><url><loc>https://www.cybereason.com/blog/why-is-emotet-so-popular-and-who-is-it-targeting-now</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/andy-feliciotti-8cvjI48SFtY-unsplash-1.jpg</image:loc><image:caption>andyfeliciotti8cvjI48SFtYunsplash1</image:caption><image:title>andyfeliciotti8cvjI48SFtYunsplash1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/blog/enriching-raw-telemetry-with-the-cybereason-historical-data-lake</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202022-03-16%20at%2010-50-57%20Blog%20Historical%20Data%20Lake%20-%20Malop%20Enrichment.png</image:loc><image:caption>Screenshot20220316at105057BlogHistoricalDataLakeMalopEnrichment</image:caption><image:title>Screenshot20220316at105057BlogHistoricalDataLakeMalopEnrichment</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202022-03-16%20at%2010-52-37%20Blog%20Historical%20Data%20Lake%20-%20Malop%20Enrichment.png</image:loc><image:caption>Screenshot20220316at105237BlogHistoricalDataLakeMalopEnrichment</image:caption><image:title>Screenshot20220316at105237BlogHistoricalDataLakeMalopEnrichment</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Screenshot%202022-03-16%20at%2010-53-42%20Blog%20Historical%20Data%20Lake%20-%20Malop%20Enrichment.png</image:loc><image:caption>Screenshot20220316at105342BlogHistoricalDataLakeMalopEnrichment</image:caption><image:title>Screenshot20220316at105342BlogHistoricalDataLakeMalopEnrichment</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/headshot.jpeg</image:loc><image:caption>headshot</image:caption><image:title>headshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(119).png</image:loc><image:caption>blogposttext119</image:caption><image:title>blogposttext119</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-03-17</lastmod></url><url><loc>https://www.cybereason.com/blog/why-xdr-is-a-must-have-for-organizations-of-every-size</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-1.png</image:loc><image:caption>CybereasonBlogTemplate151</image:caption><image:title>CybereasonBlogTemplate151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-2.png</image:loc><image:caption>CybereasonBlogTemplate52</image:caption><image:title>CybereasonBlogTemplate52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(3).png</image:loc><image:caption>ImagefromiOS3</image:caption><image:title>ImagefromiOS3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-partner-program-now-offers-more-margin-for-top-players</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CRN-Logo-5.png</image:loc><image:caption>CRNLogo5</image:caption><image:title>CRNLogo5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2019-09-11</lastmod></url><url><loc>https://www.cybereason.com/platform/dfir</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/Cybereason%20Malop%20Overview%20Screen.png</image:loc><image:caption>CybereasonMalopOverviewScreen</image:caption><image:title>CybereasonMalopOverviewScreen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malop%20details-1.png</image:loc><image:caption>Malopdetails1</image:caption><image:title>Malopdetails1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/dfir-blog-card.png</image:loc><image:caption>dfirblogcard</image:caption><image:title>dfirblogcard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/cr-dfir--thumb.jpg</image:loc><image:caption>crdfirthumb</image:caption><image:title>crdfirthumb</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/CR_Disovery_Board.png</image:loc><image:caption>CRDisoveryBoard</image:caption><image:title>CRDisoveryBoard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/EDR2_CR_ICONS-11.png</image:loc><image:caption>EDR2CRICONS11</image:caption><image:title>EDR2CRICONS11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/DEPLOY_CR_ICONS-07.png</image:loc><image:caption>DEPLOYCRICONS07</image:caption><image:title>DEPLOYCRICONS07</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/CIRCLE_CR_ICONS-34.svg</image:loc><image:caption>CIRCLECRICONS34</image:caption><image:title>CIRCLECRICONS34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><lastmod>2023-02-10</lastmod></url><url><loc>https://www.cybereason.com/consulting/experts/courtney-durrant</loc><lastmod>2025-08-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/inside-complex-ransomops-and-the-ransomware-economy</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EngineerIT%20logo.png</image:loc><image:caption>EngineerITlogo</image:caption><image:title>EngineerITlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2022-05-09</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-conti-ransomware-works</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Govinfosecurity.com%20logo.jpg</image:loc><image:caption>Govinfosecuritycomlogo</image:caption><image:title>Govinfosecuritycomlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-02-04</lastmod></url><url><loc>https://www.cybereason.com/blog/botnets-honeypot-automation-cybersecurity</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Honeypot_Header.jpg</image:loc><image:caption>HoneypotHeader</image:caption><image:title>HoneypotHeader</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/BLOG_Images_Template_v2%20(8).png</image:loc><image:caption>BLOGImagesTemplatev28</image:caption><image:title>BLOGImagesTemplatev28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/activemq-blog-featured.png</image:loc><image:caption>activemqblogfeatured</image:caption><image:title>activemqblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Honeypot_Timeline%20(1).png</image:loc><image:caption>HoneypotTimeline1</image:caption><image:title>HoneypotTimeline1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-05-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/ross-rustici-discusses-north-koreas-cyber-capabilities-and-threat-as-a-nation-state-actor</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/gov-matters-url-logos-color.jpg</image:loc><image:caption>govmattersurllogoscolor</image:caption><image:title>govmattersurllogoscolor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2018-03-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/despite-arrests-lapsus-hacking-group-strikes-again-hitting-it-supplier</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/PC%20Magazine%20logo.png</image:loc><image:caption>PCMagazinelogo</image:caption><image:title>PCMagazinelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2022-04-03</lastmod></url><url><loc>https://www.cybereason.com/resources/endpoint-security-what-matters-most-to-security-teams</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-06-03</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-partners-with-sysware-to-secure-indonesian-companies</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(47).png</image:loc><image:caption>CybereasonBlogtemplate47</image:caption><image:title>CybereasonBlogtemplate47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2021-09-22</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-research-shows-why-its-never-a-good-idea-to-pay-ransom</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Channel%20Futures-1.png</image:loc><image:caption>ChannelFutures1</image:caption><image:title>ChannelFutures1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-06-22</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-a-2021-top-hightech-company-to-work-for-by-dun-bradstreet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/top-information-security-companies-in-the-uk</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Enterprise%20Security%20logo.jpg</image:loc><image:caption>EnterpriseSecuritylogo</image:caption><image:title>EnterpriseSecuritylogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2020-06-12</lastmod></url><url><loc>https://www.cybereason.com/blog/defending-against-the-five-stages-of-a-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-06T070615.090.png</image:loc><image:caption>blogposttext20220906T070615090</image:caption><image:title>blogposttext20220906T070615090</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(14).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews14</image:caption><image:title>CopyofBLOGSOCIALSETNews14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-14T093955.662.png</image:loc><image:caption>blogposttext20220614T093955662</image:caption><image:title>blogposttext20220614T093955662</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-06-20</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/black-basta-ransomware-crew-aiming-for-big-leagues</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-Jun-24-2022-01-44-38-92-PM.png</image:loc><image:caption>ComputerWeeklylogoJun24202201443892PM</image:caption><image:title>ComputerWeeklylogoJun24202201443892PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-06-24</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/intel-zombieload-fix-prompts-processor-slowdown-fears</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MSN%20logo-1.png</image:loc><image:caption>MSNlogo1</image:caption><image:title>MSNlogo1</image:title></image:image><lastmod>2019-05-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cold-topics-at-rsa-that-should-receive-more-attention</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/network_world.jpg</image:loc><image:caption>networkworld</image:caption><image:title>networkworld</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><lastmod>2017-12-23</lastmod></url><url><loc>https://www.cybereason.com/blog/sodinokibi-ransomware-gang-extorts-apple-through-supply-chain-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-18T085148.693.png</image:loc><image:caption>blogposttext20221018T085148693</image:caption><image:title>blogposttext20221018T085148693</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Sodinokibi-blog.png</image:loc><image:caption>Sodinokibiblog</image:caption><image:title>Sodinokibiblog</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/10biggest.png</image:loc><image:caption>10biggest</image:caption><image:title>10biggest</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><lastmod>2021-11-23</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-discovers-valak-malware-an-evasive-and-sophisticated-threat-to-enterprises-in-the-united-states-and-germany</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-05-29</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-vs.-hermeticwiper-and-isaacwiper</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(47).png</image:loc><image:caption>CopyofBLOGSOCIALSETNews47</image:caption><image:title>CopyofBLOGSOCIALSETNews47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image5-Mar-03-2022-06-46-35-10-PM.png</image:loc><image:caption>image5Mar03202206463510PM</image:caption><image:title>image5Mar03202206463510PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image7-Mar-03-2022-06-50-12-54-PM.png</image:loc><image:caption>image7Mar03202206501254PM</image:caption><image:title>image7Mar03202206501254PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image3-Mar-03-2022-06-49-31-79-PM.png</image:loc><image:caption>image3Mar03202206493179PM</image:caption><image:title>image3Mar03202206493179PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image4-Mar-03-2022-06-45-55-10-PM.png</image:loc><image:caption>image4Mar03202206455510PM</image:caption><image:title>image4Mar03202206455510PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-Mar-03-2022-06-44-58-50-PM.png</image:loc><image:caption>image6Mar03202206445850PM</image:caption><image:title>image6Mar03202206445850PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Mar-03-2022-06-48-44-73-PM.png</image:loc><image:caption>image2Mar03202206484473PM</image:caption><image:title>image2Mar03202206484473PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image1-Mar-03-2022-06-47-17-32-PM.png</image:loc><image:caption>image1Mar03202206471732PM</image:caption><image:title>image1Mar03202206471732PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><lastmod>2022-03-03</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-from-ransomware-to-blackmail-with-assaf-dahan</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/assaf%20dahan.png</image:loc><image:caption>assafdahan</image:caption><image:title>assafdahan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/83%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>83MALICIOUSLIFE</image:caption><image:title>83MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-227-Card.png</image:loc><image:caption>MLEp227Card</image:caption><image:title>MLEp227Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(29).png</image:loc><image:caption>MaliciousLifeepisode29</image:caption><image:title>MaliciousLifeepisode29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-discovers-cyber-criminals-in-china-are-targeting-consumers-with-a-fake-u.s-postal-service-mobile-app</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-07-01</lastmod></url><url><loc>https://www.cybereason.com/ar/why-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__four-lines-185px.png</image:loc><image:caption>crshapestackfourlines185px</image:caption><image:title>crshapestackfourlines185px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/defenders_owlsnoname%20(1).png</image:loc><image:caption>defendersowlsnoname1</image:caption><image:title>defendersowlsnoname1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__squares-with-hex.png</image:loc><image:caption>crshapestacksquareswithhex</image:caption><image:title>crshapestacksquareswithhex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__why-third-hex-multi.png</image:loc><image:caption>crshapestackwhythirdhexmulti</image:caption><image:title>crshapestackwhythirdhexmulti</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-11-05</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-friend-or-foe</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-144.png</image:loc><image:caption>MaliciousLife144</image:caption><image:title>MaliciousLife144</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/15%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>15MALICIOUSLIFE1</image:caption><image:title>15MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-228-Card.png</image:loc><image:caption>MLEp228Card</image:caption><image:title>MLEp228Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/blog/under-the-hood-what-artificial-intelligence-on-the-endpoint-looks-like</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-3.png</image:loc><image:caption>CybereasonBlogTemplate53</image:caption><image:title>CybereasonBlogTemplate53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8994.jpg</image:loc><image:caption>IMG8994</image:caption><image:title>IMG8994</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(106).png</image:loc><image:caption>blogposttext106</image:caption><image:title>blogposttext106</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8481.png</image:loc><image:caption>IMG8481</image:caption><image:title>IMG8481</image:title></image:image><lastmod>2021-12-06</lastmod></url><url><loc>https://www.cybereason.com/blog/securing-your-organizations-digital-transformation-with-xdr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-19T122257.609.png</image:loc><image:caption>blogposttext20220919T122257609</image:caption><image:title>blogposttext20220919T122257609</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-05-25T060629.971.png</image:loc><image:caption>blogposttext20220525T060629971</image:caption><image:title>blogposttext20220525T060629971</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(123).png</image:loc><image:caption>blogposttext123</image:caption><image:title>blogposttext123</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2022-05-25</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/many-businesses-ignore-the-basics-when-it-comes-to-security-cybereason</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Tahawul%20Tech%20logo-1.jpg</image:loc><image:caption>TahawulTechlogo1</image:caption><image:title>TahawulTechlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-08-27</lastmod></url><url><loc>https://www.cybereason.com/blog/prevention-is-not-dead-yet</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(34).png</image:loc><image:caption>blogposttext34</image:caption><image:title>blogposttext34</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-05-16T094933.342.png</image:loc><image:caption>blogposttext20220516T094933342</image:caption><image:title>blogposttext20220516T094933342</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/ripcropped.jpg</image:loc><image:caption>ripcropped</image:caption><image:title>ripcropped</image:title></image:image><lastmod>2017-12-29</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-improves-investigation-enhances-protection-and-infrastructure-management</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20search%20query%20results.png</image:loc><image:caption>cybereasonsearchqueryresults</image:caption><image:title>cybereasonsearchqueryresults</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/fileless%20protection%20source.png</image:loc><image:caption>filelessprotectionsource</image:caption><image:title>filelessprotectionsource</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20file%20search%20.png</image:loc><image:caption>cybereasonfilesearch</image:caption><image:title>cybereasonfilesearch</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(3)-1.png</image:loc><image:caption>CybereasonBlogTemplate31</image:caption><image:title>CybereasonBlogTemplate31</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20custom%20reputations.png</image:loc><image:caption>cybereasoncustomreputations</image:caption><image:title>cybereasoncustomreputations</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-4.png</image:loc><image:caption>blogposttext4</image:caption><image:title>blogposttext4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/justin-hs-hex.png</image:loc><image:caption>justinhshex</image:caption><image:title>justinhshex</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20advances%20prevention%20data%20collection.png</image:loc><image:caption>Cybereasonadvancespreventiondatacollection</image:caption><image:title>Cybereasonadvancespreventiondatacollection</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20search%20dynamic%20filters.png</image:loc><image:caption>cybereasonsearchdynamicfilters</image:caption><image:title>cybereasonsearchdynamicfilters</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/investigation%20hunting%20query.png</image:loc><image:caption>investigationhuntingquery</image:caption><image:title>investigationhuntingquery</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason%20cloud%20workload%20protection.png</image:loc><image:caption>cybereasoncloudworkloadprotection</image:caption><image:title>cybereasoncloudworkloadprotection</image:title></image:image><lastmod>2022-07-05</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/for-industrial-robots-hacking-risks-are-on-the-rise</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/wall-street-journal-logo-2.png</image:loc><image:caption>wallstreetjournallogo2</image:caption><image:title>wallstreetjournallogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2019-01-30</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-weapons-of-mass-disruption</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Yonatan%20Striem-Amit.jpg</image:loc><image:caption>YonatanStriemAmit</image:caption><image:title>YonatanStriemAmit</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Paul-Brager-Jr-1.jpeg</image:loc><image:caption>PaulBragerJr1</image:caption><image:title>PaulBragerJr1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ml-ep-236-card.png</image:loc><image:caption>mlep236card</image:caption><image:title>mlep236card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/13%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>13MALICIOUSLIFE1</image:caption><image:title>13MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jim%20langevin-1.jpeg</image:loc><image:caption>jimlangevin1</image:caption><image:title>jimlangevin1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2021-11-14</lastmod></url><url><loc>https://www.cybereason.com/blog/two-things-every-zero-trust-initiative-must-have</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8994.jpg</image:loc><image:caption>IMG8994</image:caption><image:title>IMG8994</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(74).png</image:loc><image:caption>blogposttext74</image:caption><image:title>blogposttext74</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/MalOp%20Detection%20Engine.jpg</image:loc><image:caption>MalOpDetectionEngine</image:caption><image:title>MalOpDetectionEngine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94)-1.png</image:loc><image:caption>blogposttext941</image:caption><image:title>blogposttext941</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(24).png</image:loc><image:caption>blogposttext24</image:caption><image:title>blogposttext24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-03-11</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-actor-ta505-targets-financial-enterprises-using-lolbins-and-a-new-backdoor-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews</image:caption><image:title>CopyofBLOGSOCIALSETNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-Jan-06-2023-11-40-30-7591-PM.png</image:loc><image:caption>blogposttextJan0620231140307591PM</image:caption><image:title>blogposttextJan0620231140307591PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomware-weapons-of-mass-disruption</loc><image:image><image:loc>https://www.cybereason.com/hubfs/mass-disruption-2.png</image:loc><image:caption>massdisruption2</image:caption><image:title>massdisruption2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(114).png</image:loc><image:caption>blogposttext114</image:caption><image:title>blogposttext114</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mass-disruption-1.png</image:loc><image:caption>massdisruption1</image:caption><image:title>massdisruption1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mass-disruption-3.png</image:loc><image:caption>massdisruption3</image:caption><image:title>massdisruption3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(10)-1.png</image:loc><image:caption>CybereasonBlogTemplate101</image:caption><image:title>CybereasonBlogTemplate101</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cyber-warfare-final.png</image:loc><image:caption>cyberwarfarefinal</image:caption><image:title>cyberwarfarefinal</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yossi%20Rachman.jpg</image:loc><image:caption>YossiRachman</image:caption><image:title>YossiRachman</image:title></image:image><lastmod>2021-04-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-inside-the-mitre-attck-framework</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20Life%20Template%20(1).png</image:loc><image:caption>MaliciousLifeTemplate1</image:caption><image:title>MaliciousLifeTemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(32).png</image:loc><image:caption>MaliciousLifeepisode32</image:caption><image:title>MaliciousLifeepisode32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Israel-Barak-CB2021.png</image:loc><image:caption>IsraelBarakCB2021</image:caption><image:title>IsraelBarakCB2021</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/130%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>130MALICIOUSLIFE</image:caption><image:title>130MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-10-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/yahoo-hack-2013-breach-affected-all-3-billion-of-its-accounts-tripling-originally-reported-number</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/ABC-News.png</image:loc><image:caption>ABCNews</image:caption><image:title>ABCNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2017-12-18</lastmod></url><url><loc>https://www.cybereason.com/blog/ransomops-not-your-parents-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-06T070615.090.png</image:loc><image:caption>blogposttext20220906T070615090</image:caption><image:title>blogposttext20220906T070615090</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(114).png</image:loc><image:caption>blogposttext114</image:caption><image:title>blogposttext114</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-06T123240.080.png</image:loc><image:caption>blogposttext20220706T123240080</image:caption><image:title>blogposttext20220706T123240080</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><lastmod>2022-08-03</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-election-hacking-part-2</loc><image:image><image:loc>https://www.cybereason.com/hubfs/92%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>92MALICIOUSLIFE</image:caption><image:title>92MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(7).png</image:loc><image:caption>MaliciousLifeepisode7</image:caption><image:title>MaliciousLifeepisode7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/maggie-macalpine.png</image:loc><image:caption>maggiemacalpine</image:caption><image:title>maggiemacalpine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-252-featured.png</image:loc><image:caption>MLEp252featured</image:caption><image:title>MLEp252featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/blog/what-cybersecurity-activities-may-occur-at-the-winter-olympics</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Olympic_Timeline%20(3).png</image:loc><image:caption>OlympicTimeline3</image:caption><image:title>OlympicTimeline3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/_D0A0520.jpg</image:loc><image:caption>D0A0520</image:caption><image:title>D0A0520</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Olympics_Timeline_Header-4.jpg</image:loc><image:caption>OlympicsTimelineHeader4</image:caption><image:title>OlympicsTimelineHeader4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2018-01-19</lastmod></url><url><loc>https://www.cybereason.com/blog/the-mitre-attck-framework-a-security-experts-guide</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ATT&amp;CK-Pre-ATT&amp;CK.png</image:loc><image:caption>ATTCKPreATTCK</image:caption><image:title>ATTCKPreATTCK</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070600.847.png</image:loc><image:caption>blogposttext20220707T070600847</image:caption><image:title>blogposttext20220707T070600847</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(59).png</image:loc><image:caption>blogposttext59</image:caption><image:title>blogposttext59</image:title></image:image><lastmod>2022-03-04</lastmod></url><url><loc>https://www.cybereason.com/blog/how-ai-driven-xdr-defeats-ransomware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-03T064719.647.png</image:loc><image:caption>blogposttext20220803T064719647</image:caption><image:title>blogposttext20220803T064719647</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-06-02T094421.274.png</image:loc><image:caption>blogposttext20220602T094421274</image:caption><image:title>blogposttext20220602T094421274</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(63).png</image:loc><image:caption>blogposttext63</image:caption><image:title>blogposttext63</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2022-06-15</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-and-tech-data-partner-to-protect-joint-customers-across-the-asia-pacific-region-from-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-11-03</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-partners-with-sis-international-to-protect-joint-customers-in-hong-kong</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(19)-1.png</image:loc><image:caption>CybereasonBlogTemplate191</image:caption><image:title>CybereasonBlogTemplate191</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14)-1.png</image:loc><image:caption>CybereasonBlogTemplate141</image:caption><image:title>CybereasonBlogTemplate141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(12)-1.png</image:loc><image:caption>CybereasonBlogTemplate121</image:caption><image:title>CybereasonBlogTemplate121</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-darkhotel</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(31).png</image:loc><image:caption>CybereasonBlogTemplate31</image:caption><image:title>CybereasonBlogTemplate31</image:title></image:image><lastmod>2021-12-22</lastmod></url><url><loc>https://www.cybereason.com/blog/fool-me-once-shame-on-you-fool-me-twice</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-2.png</image:loc><image:caption>blogposttext2</image:caption><image:title>blogposttext2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_436711951-1.jpg</image:loc><image:caption>shutterstock4367119511</image:caption><image:title>shutterstock4367119511</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(127).png</image:loc><image:caption>blogposttext127</image:caption><image:title>blogposttext127</image:title></image:image><lastmod>2018-01-25</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-launches-industrys-first-mdr-mobile-app-putting-the-power-of-the-soc-at-defenders-fingertips</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-08-15</lastmod></url><url><loc>https://www.cybereason.com/blog/research/threat-analysis-report-snake-infostealer-malware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-8.png</image:loc><image:caption>snakeblog8</image:caption><image:title>snakeblog8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image27-Oct-27-2021-07-07-12-15-PM.png</image:loc><image:caption>image27Oct27202107071215PM</image:caption><image:title>image27Oct27202107071215PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-20.png</image:loc><image:caption>snakeblog20</image:caption><image:title>snakeblog20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-8-b.png</image:loc><image:caption>snakeblog8b</image:caption><image:title>snakeblog8b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-16.png</image:loc><image:caption>snakeblog16</image:caption><image:title>snakeblog16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-2.png</image:loc><image:caption>snakeblog2</image:caption><image:title>snakeblog2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-9.png</image:loc><image:caption>snakeblog9</image:caption><image:title>snakeblog9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Capture-4.png</image:loc><image:caption>Capture4</image:caption><image:title>Capture4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-1.png</image:loc><image:caption>snakeblog1</image:caption><image:title>snakeblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-22.png</image:loc><image:caption>snakeblog22</image:caption><image:title>snakeblog22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-26.png</image:loc><image:caption>snakeblog26</image:caption><image:title>snakeblog26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-14.png</image:loc><image:caption>snakeblog14</image:caption><image:title>snakeblog14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-25.png</image:loc><image:caption>snakeblog25</image:caption><image:title>snakeblog25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-13.png</image:loc><image:caption>snakeblog13</image:caption><image:title>snakeblog13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4)%20(1).png</image:loc><image:caption>ThreatAlerttemplate41</image:caption><image:title>ThreatAlerttemplate41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-17.jpg</image:loc><image:caption>snakeblog17</image:caption><image:title>snakeblog17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-5.png</image:loc><image:caption>snakeblog5</image:caption><image:title>snakeblog5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-11-b.png</image:loc><image:caption>snakeblog11b</image:caption><image:title>snakeblog11b</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-21.png</image:loc><image:caption>snakeblog21</image:caption><image:title>snakeblog21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-24.png</image:loc><image:caption>snakeblog24</image:caption><image:title>snakeblog24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-15.png</image:loc><image:caption>snakeblog15</image:caption><image:title>snakeblog15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-6.png</image:loc><image:caption>snakeblog6</image:caption><image:title>snakeblog6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-23.png</image:loc><image:caption>snakeblog23</image:caption><image:title>snakeblog23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-4.png</image:loc><image:caption>snakeblog4</image:caption><image:title>snakeblog4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image2-Oct-27-2021-05-10-24-94-PM.png</image:loc><image:caption>image2Oct27202105102494PM</image:caption><image:title>image2Oct27202105102494PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(4).png</image:loc><image:caption>ThreatAlerttemplate4</image:caption><image:title>ThreatAlerttemplate4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-12.png</image:loc><image:caption>snakeblog12</image:caption><image:title>snakeblog12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-11.png</image:loc><image:caption>snakeblog11</image:caption><image:title>snakeblog11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-7.png</image:loc><image:caption>snakeblog7</image:caption><image:title>snakeblog7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-19.png</image:loc><image:caption>snakeblog19</image:caption><image:title>snakeblog19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-10.png</image:loc><image:caption>snakeblog10</image:caption><image:title>snakeblog10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-18.png</image:loc><image:caption>snakeblog18</image:caption><image:title>snakeblog18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/snake-blog-3.png</image:loc><image:caption>snakeblog3</image:caption><image:title>snakeblog3</image:title></image:image><lastmod>2022-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/stock-trading-app-robinhood-hit-by-mega-data-breach</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRadar%20logo-4.png</image:loc><image:caption>TechRadarlogo4</image:caption><image:title>TechRadarlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-11-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/honeypots-and-the-evolution-of-botnets</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/csoonline-logo.jpg</image:loc><image:caption>csoonlinelogo</image:caption><image:title>csoonlinelogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2018-04-23</lastmod></url><url><loc>https://www.cybereason.com/blog/cybereason-in-the-news-kovter-malware-upgrade-takes-it-from-mild-to-mean</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/activemq-blog-featured.png</image:loc><image:caption>activemqblogfeatured</image:caption><image:title>activemqblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_208664215-1000x391.jpg</image:loc><image:caption>shutterstock2086642151000x391</image:caption><image:title>shutterstock2086642151000x391</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/goot-loader-blog-featured.png</image:loc><image:caption>gootloaderblogfeatured</image:caption><image:title>gootloaderblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2018-01-09</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-protecting-the-panama-papers-whistleblower</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/84%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>84MALICIOUSLIFE</image:caption><image:title>84MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-241-Card.png</image:loc><image:caption>MLEp241Card</image:caption><image:title>MLEp241Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-250-featured-image.png</image:loc><image:caption>MLEp250featuredimage</image:caption><image:title>MLEp250featuredimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bastian%20Obermayer.jpg</image:loc><image:caption>BastianObermayer</image:caption><image:title>BastianObermayer</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><lastmod>2021-09-30</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/how-to-test-if-your-smart-devices-are-vulnerable-to-hackers</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/bostinno.jpg</image:loc><image:caption>bostinno</image:caption><image:title>bostinno</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2017-12-20</lastmod></url><url><loc>https://www.cybereason.com/press-releases/cybereason-pledges-50-million-in-free-enterprise-software-to-companies-hit-by-the-massive-global-wannacry-ransomware-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2020-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-operation-snow-white-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(5).png</image:loc><image:caption>MaliciousLifeepisode5</image:caption><image:title>MaliciousLifeepisode5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-251-featured.png</image:loc><image:caption>MLEp251featured</image:caption><image:title>MLEp251featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-252-featured.png</image:loc><image:caption>MLEp252featured</image:caption><image:title>MLEp252featured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Tony_Ortega.jpg</image:loc><image:caption>TonyOrtega</image:caption><image:title>TonyOrtega</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/Jon-Atack.jpeg</image:loc><image:caption>JonAtack</image:caption><image:title>JonAtack</image:title></image:image><lastmod>2024-10-01</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/travelex-hack-hits-high-street-banks-showing-dangers-of-interconnectivity-and-dependence</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Verdict-Logo-10.jpg</image:loc><image:caption>VerdictLogo10</image:caption><image:title>VerdictLogo10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><lastmod>2020-01-14</lastmod></url><url><loc>https://www.cybereason.com/fr/platform</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/french-malop.png</image:loc><image:caption>frenchmalop</image:caption><image:title>frenchmalop</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-hybrid.svg</image:loc><image:caption>smalliconhybrid</image:caption><image:title>smalliconhybrid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILITY_HUNTING_CR_ICONS-13.svg</image:loc><image:caption>VISIBILITYHUNTINGCRICONS13</image:caption><image:title>VISIBILITYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__optional-100px.png</image:loc><image:caption>crchartoptional100px</image:caption><image:title>crchartoptional100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-apple.svg</image:loc><image:caption>smalliconapple</image:caption><image:title>smalliconapple</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/REALTIME_PROTECTION_MULTILAYERED_CR_ICONS-04.svg</image:loc><image:caption>REALTIMEPROTECTIONMULTILAYEREDCRICONS04</image:caption><image:title>REALTIMEPROTECTIONMULTILAYEREDCRICONS04</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-left-2.svg</image:loc><image:caption>futurereadyleft2</image:caption><image:title>futurereadyleft2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-right-2.svg</image:loc><image:caption>futurereadyright2</image:caption><image:title>futurereadyright2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-cloud.svg</image:loc><image:caption>smalliconcloud</image:caption><image:title>smalliconcloud</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-android.svg</image:loc><image:caption>smalliconandroid</image:caption><image:title>smalliconandroid</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Platform%20Page%20Images/CR_Disovery_Board.png</image:loc><image:caption>CRDisoveryBoard</image:caption><image:title>CRDisoveryBoard</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-defense-platform_Page_1-1.png</image:loc><image:caption>crdefenseplatformPage11</image:caption><image:title>crdefenseplatformPage11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-on-prem.svg</image:loc><image:caption>smallicononprem</image:caption><image:title>smallicononprem</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hexagon-lines-hero.png</image:loc><image:caption>crbghexagonlineshero</image:caption><image:title>crbghexagonlineshero</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-100px.png</image:loc><image:caption>crchartcheckmark100px</image:caption><image:title>crchartcheckmark100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-windows.svg</image:loc><image:caption>smalliconwindows</image:caption><image:title>smalliconwindows</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/footer-line.svg</image:loc><image:caption>footerline</image:caption><image:title>footerline</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-left-1.svg</image:loc><image:caption>futurereadyleft1</image:caption><image:title>futurereadyleft1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/cr-chart__checkmark-yellowBG-100px.png</image:loc><image:caption>crchartcheckmarkyellowBG100px</image:caption><image:title>crchartcheckmarkyellowBG100px</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/future-ready-right-1.svg</image:loc><image:caption>futurereadyright1</image:caption><image:title>futurereadyright1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-air-gapped.svg</image:loc><image:caption>smalliconairgapped</image:caption><image:title>smalliconairgapped</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PLATFORM2_CR_ICONS-02.svg</image:loc><image:caption>PLATFORM2CRICONS02</image:caption><image:title>PLATFORM2CRICONS02</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-feature__flex--shape-collage.png</image:loc><image:caption>crbgfeatureflexshapecollage</image:caption><image:title>crbgfeatureflexshapecollage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/platform-graphic/img/small-icon-linux.svg</image:loc><image:caption>smalliconlinux</image:caption><image:title>smalliconlinux</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2024-02-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/manchester-united-praised-for-swift-response-to-cyber-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Computer%20Weekly%20logo-4.png</image:loc><image:caption>ComputerWeeklylogo4</image:caption><image:title>ComputerWeeklylogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-11-23</lastmod></url><url><loc>https://www.cybereason.com/blog/product/shields-up-is-your-ransomware-protection-what-it-should-be</loc><image:image><image:loc>https://www.cybereason.com/hubfs/FBI-CISA-Cuba-Ransomware.png</image:loc><image:caption>FBICISACubaRansomware</image:caption><image:title>FBICISACubaRansomware</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(11)-1.png</image:loc><image:caption>CybereasonBlogTemplate111</image:caption><image:title>CybereasonBlogTemplate111</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(19).png</image:loc><image:caption>blogposttext19</image:caption><image:title>blogposttext19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/resources/addressing-ransomwares-evolution-with-behavioral-prevention</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Behavioral-Prevention-Banner-Resources.png</image:loc><image:caption>BehavioralPreventionBannerResources</image:caption><image:title>BehavioralPreventionBannerResources</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2020-08-04</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-frank-gillman-lewis-brisbois-cybereason-interview</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Gillman_Frank.jpg</image:loc><image:caption>GillmanFrank</image:caption><image:title>GillmanFrank</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(19).png</image:loc><image:caption>MaliciousLifeepisode19</image:caption><image:title>MaliciousLifeepisode19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/shutterstock_31692916.jpg</image:loc><image:caption>shutterstock31692916</image:caption><image:title>shutterstock31692916</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/roman-seleznev-ep-219.png</image:loc><image:caption>romanseleznevep219</image:caption><image:title>romanseleznevep219</image:title></image:image><lastmod>2018-04-13</lastmod></url><url><loc>https://www.cybereason.com/services/mobile-mdr</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4/medium.jpg</video:thumbnail_loc><video:title>preventid-homepage-hero-bg</video:title><video:description>preventid-homepage-hero-bg</video:description><video:content_loc>https://www.cybereason.com/hubfs/dam/videos/preventid-homepage-hero-bg.mp4</video:content_loc><video:duration>8</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/PREVENTION_CR_ICONS-21.svg</image:loc><image:caption>PREVENTIONCRICONS21</image:caption><image:title>PREVENTIONCRICONS21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason-Mobile-Screen-2.png</image:loc><image:caption>CybereasonMobileScreen2</image:caption><image:title>CybereasonMobileScreen2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/shapes/cr-shape-stack__three-hex__textured.png</image:loc><image:caption>crshapestackthreehextextured</image:caption><image:title>crshapestackthreehextextured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/VISIBILITY_HUNTING_CR_ICONS-13.svg</image:loc><image:caption>VISIBILITYHUNTINGCRICONS13</image:caption><image:title>VISIBILITYHUNTINGCRICONS13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-hero--blue-subtle-with-talon--v2.png</image:loc><image:caption>crbgherobluesubtlewithtalonv2</image:caption><image:title>crbgherobluesubtlewithtalonv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/product-images/Cybereason-Mobile-Screen-3.png</image:loc><image:caption>CybereasonMobileScreen3</image:caption><image:title>CybereasonMobileScreen3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/AUTONOMOUS_PREVENTION_CR_ICONS-14.svg</image:loc><image:caption>AUTONOMOUSPREVENTIONCRICONS14</image:caption><image:title>AUTONOMOUSPREVENTIONCRICONS14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/mobile-product-brief_Page_1.png</image:loc><image:caption>mobileproductbriefPage1</image:caption><image:title>mobileproductbriefPage1</image:title></image:image><lastmod>2022-10-11</lastmod></url><url><loc>https://www.cybereason.com/blog/research/fakespy-masquerades-as-postal-service-apps-around-the-world</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Fakespy-centered.png</image:loc><image:caption>Fakespycentered</image:caption><image:title>Fakespycentered</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-24.png</image:loc><image:caption>FakeSpy24</image:caption><image:title>FakeSpy24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-20.gif</image:loc><image:caption>FakeSpy20</image:caption><image:title>FakeSpy20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-17.png</image:loc><image:caption>FakeSpy17</image:caption><image:title>FakeSpy17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Ofir%20Almkias.jpg</image:loc><image:caption>OfirAlmkias</image:caption><image:title>OfirAlmkias</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-2.png</image:loc><image:caption>FakeSpy2</image:caption><image:title>FakeSpy2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-11.png</image:loc><image:caption>FakeSpy11</image:caption><image:title>FakeSpy11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-22.png</image:loc><image:caption>FakeSpy22</image:caption><image:title>FakeSpy22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-5.png</image:loc><image:caption>FakeSpy5</image:caption><image:title>FakeSpy5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-18.png</image:loc><image:caption>FakeSpy18</image:caption><image:title>FakeSpy18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-07-07T070048.910.png</image:loc><image:caption>blogposttext20220707T070048910</image:caption><image:title>blogposttext20220707T070048910</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-15.png</image:loc><image:caption>FakeSpy15</image:caption><image:title>FakeSpy15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-13.png</image:loc><image:caption>FakeSpy13</image:caption><image:title>FakeSpy13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-25.png</image:loc><image:caption>FakeSpy25</image:caption><image:title>FakeSpy25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-8.png</image:loc><image:caption>FakeSpy8</image:caption><image:title>FakeSpy8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-12.png</image:loc><image:caption>FakeSpy12</image:caption><image:title>FakeSpy12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-10.png</image:loc><image:caption>FakeSpy10</image:caption><image:title>FakeSpy10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-19.png</image:loc><image:caption>FakeSpy19</image:caption><image:title>FakeSpy19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-23.png</image:loc><image:caption>FakeSpy23</image:caption><image:title>FakeSpy23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-21.png</image:loc><image:caption>FakeSpy21</image:caption><image:title>FakeSpy21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image19-Jun-30-2020-07-52-28-45-PM.png</image:loc><image:caption>image19Jun30202007522845PM</image:caption><image:title>image19Jun30202007522845PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-16.png</image:loc><image:caption>FakeSpy16</image:caption><image:title>FakeSpy16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image25.jpg</image:loc><image:caption>image25</image:caption><image:title>image25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-9.png</image:loc><image:caption>FakeSpy9</image:caption><image:title>FakeSpy9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-26.png</image:loc><image:caption>FakeSpy26</image:caption><image:title>FakeSpy26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-7.png</image:loc><image:caption>FakeSpy7</image:caption><image:title>FakeSpy7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-4.png</image:loc><image:caption>FakeSpy4</image:caption><image:title>FakeSpy4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-14.png</image:loc><image:caption>FakeSpy14</image:caption><image:title>FakeSpy14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-1.png</image:loc><image:caption>FakeSpy1</image:caption><image:title>FakeSpy1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/FakeSpy-6.png</image:loc><image:caption>FakeSpy6</image:caption><image:title>FakeSpy6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(2).png</image:loc><image:caption>ImagefromiOS2</image:caption><image:title>ImagefromiOS2</image:title></image:image><lastmod>2022-03-31</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/a-third-of-organizations-hit-by-ransomware-were-forced-to-close-temporarily-or-permanently</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TechRepublic%20logo-Jun-10-2022-02-11-06-72-AM.png</image:loc><image:caption>TechRepubliclogoJun10202202110672AM</image:caption><image:title>TechRepubliclogoJun10202202110672AM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2022-06-10</lastmod></url><url><loc>https://www.cybereason.com/blog/how-a-us-cyber-attack-against-russia-could-impact-cisos</loc><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(32).png</image:loc><image:caption>blogposttext32</image:caption><image:title>blogposttext32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/shutterstock_365958512.jpg</image:loc><image:caption>shutterstock365958512</image:caption><image:title>shutterstock365958512</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(6).png</image:loc><image:caption>MaliciousLifeepisode6</image:caption><image:title>MaliciousLifeepisode6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><lastmod>2018-07-10</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/russian-attacks-on-covid19-vaccine-developers-how-why-and-what-happens-next</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Infosecurity%20Magazine%20logo-2.png</image:loc><image:caption>InfosecurityMagazinelogo2</image:caption><image:title>InfosecurityMagazinelogo2</image:title></image:image><lastmod>2020-08-06</lastmod></url><url><loc>https://www.cybereason.com/blog/targeted-by-ransomware-here-are-three-things-to-do-straight-away</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(99).png</image:loc><image:caption>blogposttext99</image:caption><image:title>blogposttext99</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(110).png</image:loc><image:caption>blogposttext110</image:caption><image:title>blogposttext110</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(1).png</image:loc><image:caption>CybereasonBlogtemplate1</image:caption><image:title>CybereasonBlogtemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-05-24</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-acquires-empow-to-enhance-xdr-offerings</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-07-20</lastmod></url><url><loc>https://www.cybereason.com/blog/how-visibility-can-help-combat-apts-and-return-power-to-the-defenders</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(41).png</image:loc><image:caption>blogposttext41</image:caption><image:title>blogposttext41</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(83).png</image:loc><image:caption>blogposttext83</image:caption><image:title>blogposttext83</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cr-featured-image.png</image:loc><image:caption>crfeaturedimage</image:caption><image:title>crfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-04-06</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-the-blaster-worm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(20).png</image:loc><image:caption>MaliciousLifeepisode20</image:caption><image:title>MaliciousLifeepisode20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-1.png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image10-4.png</image:loc><image:caption>image104</image:caption><image:title>image104</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><lastmod>2018-05-16</lastmod></url><url><loc>https://www.cybereason.com/resources/datasheet-analyst-tabletop-exercise</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/content-covers-thumbnails/analyst-tabletop-exercise-datasheet-cover.png</image:loc><image:caption>analysttabletopexercisedatasheetcover</image:caption><image:title>analysttabletopexercisedatasheetcover</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><lastmod>2023-10-17</lastmod></url><url><loc>https://www.cybereason.com/blog/xdr/why-xdr-adoption-should-be-a-ciso-priority</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(90).png</image:loc><image:caption>blogposttext90</image:caption><image:title>blogposttext90</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-10-05T071704.749.png</image:loc><image:caption>blogposttext20221005T071704749</image:caption><image:title>blogposttext20221005T071704749</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T130918.199.png</image:loc><image:caption>blogposttext20220926T130918199</image:caption><image:title>blogposttext20220926T130918199</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><lastmod>2022-04-27</lastmod></url><url><loc>https://www.cybereason.com/press/cybereasons-lodrina-cherne-to-give-keynote-talk-at-sans-virtual-digital-forensics-incident-response-summit</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/blog/ciso-stories-podcast-the-nexus-of-security-privacy-and-trust</loc><image:image><image:loc>https://www.cybereason.com/hubfs/todd-fitzgerald-hex-hs.png</image:loc><image:caption>toddfitzgeraldhexhs</image:caption><image:title>toddfitzgeraldhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/sam-hex-hs.png</image:loc><image:caption>samhexhs</image:caption><image:title>samhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(7)-2.png</image:loc><image:caption>CISOStoriestemplate72</image:caption><image:title>CISOStoriestemplate72</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(4).png</image:loc><image:caption>CISOStoriespodcast4</image:caption><image:title>CISOStoriespodcast4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories%20template%20(4)-3.png</image:loc><image:caption>CISOStoriestemplate43</image:caption><image:title>CISOStoriestemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Alison%20Miller.png</image:loc><image:caption>AlisonMiller</image:caption><image:title>AlisonMiller</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/ciso-stories-logo.png</image:loc><image:caption>cisostorieslogo</image:caption><image:title>cisostorieslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-11-04</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/bazar-backdoor-linked-to-trickbot-banking-trojan-campaigns</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ZDNet%20logo.png</image:loc><image:caption>ZDNetlogo</image:caption><image:title>ZDNetlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2020-08-06</lastmod></url><url><loc>https://www.cybereason.com/blog/webinar-revil-ransomware-pick-your-path</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(46).png</image:loc><image:caption>CybereasonBlogTemplate46</image:caption><image:title>CybereasonBlogTemplate46</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(97).png</image:loc><image:caption>blogposttext97</image:caption><image:title>blogposttext97</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/jj-hex-hs2.png</image:loc><image:caption>jjhexhs2</image:caption><image:title>jjhexhs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(23).png</image:loc><image:caption>CybereasonBlogTemplate23</image:caption><image:title>CybereasonBlogTemplate23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/headshots/peter-ortiz-hex-hs.png</image:loc><image:caption>peterortizhexhs</image:caption><image:title>peterortizhexhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><lastmod>2021-08-17</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybereason-partners-with-google-chronicle-on-xdr-product</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SecurityWeek%20logo.jpg</image:loc><image:caption>SecurityWeeklogo</image:caption><image:title>SecurityWeeklogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/6-most-important-things-in-business</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/Yahoo!%20News.png</image:loc><image:caption>YahooNews</image:caption><image:title>YahooNews</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2017-12-19</lastmod></url><url><loc>https://www.cybereason.com/blog/the-solarwinds-supply-chain-attack-and-the-limits-of-cyber-hygiene</loc><image:image><image:loc>https://www.cybereason.com/hubfs/sam-curry.jpeg</image:loc><image:caption>samcurry</image:caption><image:title>samcurry</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/solarwind-russia-hack-blog-card-1.png</image:loc><image:caption>solarwindrussiahackblogcard1</image:caption><image:title>solarwindrussiahackblogcard1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-243-Card.png</image:loc><image:caption>MLEp243Card</image:caption><image:title>MLEp243Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CISO%20Stories-podcast%20(1).png</image:loc><image:caption>CISOStoriespodcast1</image:caption><image:title>CISOStoriespodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-04-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/gootloader-malware-seo-poisoning-impacting-healthcare</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Health%20IT%20Security%20logo-1.png</image:loc><image:caption>HealthITSecuritylogo1</image:caption><image:title>HealthITSecuritylogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2023-02-14</lastmod></url><url><loc>https://www.cybereason.com/blog/actionable-xdr-telemetry-vs.-uncorrelated-siem-alerts</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(15)-1.png</image:loc><image:caption>CybereasonBlogTemplate151</image:caption><image:title>CybereasonBlogTemplate151</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Image%20from%20iOS%20(3).png</image:loc><image:caption>ImagefromiOS3</image:caption><image:title>ImagefromiOS3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-2.png</image:loc><image:caption>CybereasonBlogTemplate52</image:caption><image:title>CybereasonBlogTemplate52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/android-users-beware-fakespy-malware-is-back-and-is-dangerous-than-ever-before</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Yahoo!%20News-Jul-15-2020-06-50-07-01-PM.png</image:loc><image:caption>YahooNewsJul15202006500701PM</image:caption><image:title>YahooNewsJul15202006500701PM</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2020-07-15</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/asaf-hotnik</loc><video:video><video:thumbnail_loc>https://www.cybereason.com/hubfs/private-infrastructure-protection-version-21-2.mp4/medium.jpg</video:thumbnail_loc><video:title>private-infrastructure-protection-version-21-2</video:title><video:description>private-infrastructure-protection-version-21-2</video:description><video:content_loc>https://www.cybereason.com/hubfs/private-infrastructure-protection-version-21-2.mp4</video:content_loc><video:duration>292</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-26T131959.309.png</image:loc><image:caption>blogposttext20220926T131959309</image:caption><image:title>blogposttext20220926T131959309</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Asaf-Hotnik.png</image:loc><image:caption>AsafHotnik</image:caption><image:title>AsafHotnik</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/cybersecurity-trends-you-cant-ignore-in-2022</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CXO%20Middle%20East%20logo-1.jpg</image:loc><image:caption>CXOMiddleEastlogo1</image:caption><image:title>CXOMiddleEastlogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2021-12-02</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-hackback</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Yonatan%20Striem-Amit.jpg</image:loc><image:caption>YonatanStriemAmit</image:caption><image:title>YonatanStriemAmit</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-240-Card.png</image:loc><image:caption>MLEp240Card</image:caption><image:title>MLEp240Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-233-Card.png</image:loc><image:caption>MLEp233Card</image:caption><image:title>MLEp233Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/20%20-%20MALICIOUS%20LIFE-1.png</image:loc><image:caption>20MALICIOUSLIFE1</image:caption><image:title>20MALICIOUSLIFE1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2023-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/google-cloud-and-cybereason-team-up-to-fight-cyberattacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Beta%20News%20logo-3.png</image:loc><image:caption>BetaNewslogo3</image:caption><image:title>BetaNewslogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><lastmod>2021-10-13</lastmod></url><url><loc>https://www.cybereason.com/blog/research/phoenix-the-tale-of-the-resurrected-alpha-keylogger</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger.png</image:loc><image:caption>PhoenixKeylogger</image:caption><image:title>PhoenixKeylogger</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-28.png</image:loc><image:caption>PhoenixKeylogger28</image:caption><image:title>PhoenixKeylogger28</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-30.png</image:loc><image:caption>PhoenixKeylogger30</image:caption><image:title>PhoenixKeylogger30</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-14.png</image:loc><image:caption>PhoenixKeylogger14</image:caption><image:title>PhoenixKeylogger14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat%20Alert%20template%20(2).png</image:loc><image:caption>ThreatAlerttemplate2</image:caption><image:title>ThreatAlerttemplate2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-29.png</image:loc><image:caption>PhoenixKeylogger29</image:caption><image:title>PhoenixKeylogger29</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-18.png</image:loc><image:caption>PhoenixKeylogger18</image:caption><image:title>PhoenixKeylogger18</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-27.png</image:loc><image:caption>PhoenixKeylogger27</image:caption><image:title>PhoenixKeylogger27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-5.png</image:loc><image:caption>PhoenixKeylogger5</image:caption><image:title>PhoenixKeylogger5</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-142.png</image:loc><image:caption>image142</image:caption><image:title>image142</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-13.png</image:loc><image:caption>PhoenixKeylogger13</image:caption><image:title>PhoenixKeylogger13</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-11.png</image:loc><image:caption>PhoenixKeylogger11</image:caption><image:title>PhoenixKeylogger11</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(87).png</image:loc><image:caption>blogposttext87</image:caption><image:title>blogposttext87</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-16.png</image:loc><image:caption>PhoenixKeylogger16</image:caption><image:title>PhoenixKeylogger16</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-22.png</image:loc><image:caption>PhoenixKeylogger22</image:caption><image:title>PhoenixKeylogger22</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-black-old.png</image:loc><image:caption>crlogoinlineprimaryblackold</image:caption><image:title>crlogoinlineprimaryblackold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-25.png</image:loc><image:caption>PhoenixKeylogger25</image:caption><image:title>PhoenixKeylogger25</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-6.png</image:loc><image:caption>PhoenixKeylogger6</image:caption><image:title>PhoenixKeylogger6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-9.png</image:loc><image:caption>PhoenixKeylogger9</image:caption><image:title>PhoenixKeylogger9</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-3.png</image:loc><image:caption>PhoenixKeylogger3</image:caption><image:title>PhoenixKeylogger3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-141.png</image:loc><image:caption>image141</image:caption><image:title>image141</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-10.png</image:loc><image:caption>PhoenixKeylogger10</image:caption><image:title>PhoenixKeylogger10</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-23.png</image:loc><image:caption>PhoenixKeylogger23</image:caption><image:title>PhoenixKeylogger23</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-139.png</image:loc><image:caption>image139</image:caption><image:title>image139</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-7.png</image:loc><image:caption>PhoenixKeylogger7</image:caption><image:title>PhoenixKeylogger7</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-20.png</image:loc><image:caption>PhoenixKeylogger20</image:caption><image:title>PhoenixKeylogger20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-24.png</image:loc><image:caption>PhoenixKeylogger24</image:caption><image:title>PhoenixKeylogger24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-36.png</image:loc><image:caption>PhoenixKeylogger36</image:caption><image:title>PhoenixKeylogger36</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-4.png</image:loc><image:caption>PhoenixKeylogger4</image:caption><image:title>PhoenixKeylogger4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-8.png</image:loc><image:caption>PhoenixKeylogger8</image:caption><image:title>PhoenixKeylogger8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-19.png</image:loc><image:caption>PhoenixKeylogger19</image:caption><image:title>PhoenixKeylogger19</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image-140.png</image:loc><image:caption>image140</image:caption><image:title>image140</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-12.png</image:loc><image:caption>PhoenixKeylogger12</image:caption><image:title>PhoenixKeylogger12</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-15.png</image:loc><image:caption>PhoenixKeylogger15</image:caption><image:title>PhoenixKeylogger15</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-21.png</image:loc><image:caption>PhoenixKeylogger21</image:caption><image:title>PhoenixKeylogger21</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-26.png</image:loc><image:caption>PhoenixKeylogger26</image:caption><image:title>PhoenixKeylogger26</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-32.png</image:loc><image:caption>PhoenixKeylogger32</image:caption><image:title>PhoenixKeylogger32</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-17.png</image:loc><image:caption>PhoenixKeylogger17</image:caption><image:title>PhoenixKeylogger17</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-1.png</image:loc><image:caption>PhoenixKeylogger1</image:caption><image:title>PhoenixKeylogger1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-inline--primary-white-old.png</image:loc><image:caption>crlogoinlineprimarywhiteold</image:caption><image:title>crlogoinlineprimarywhiteold</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Phoenix%20Keylogger-2.png</image:loc><image:caption>PhoenixKeylogger2</image:caption><image:title>PhoenixKeylogger2</image:title></image:image><lastmod>2022-05-26</lastmod></url><url><loc>https://www.cybereason.com/blog/an-operation-centric-approach-to-ransomops-prevention</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(14).png</image:loc><image:caption>CybereasonBlogTemplate14</image:caption><image:title>CybereasonBlogTemplate14</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20template%20(1).png</image:loc><image:caption>CybereasonBlogtemplate1</image:caption><image:title>CybereasonBlogtemplate1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(27).png</image:loc><image:caption>blogposttext27</image:caption><image:title>blogposttext27</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-12-22</lastmod></url><url><loc>https://www.cybereason.com/blog/malicious-life-podcast-the-wank-worm-part-1</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/apple-podcast-player-1.png</image:loc><image:caption>applepodcastplayer1</image:caption><image:title>applepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/eli-salem-hs.png</image:loc><image:caption>elisalemhs</image:caption><image:title>elisalemhs</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-malicious-life-logo--solid-bg.jpeg</image:loc><image:caption>crmaliciouslifelogosolidbg</image:caption><image:title>crmaliciouslifelogosolidbg</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/google-podcast-player-1.png</image:loc><image:caption>googlepodcastplayer1</image:caption><image:title>googlepodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/46%20-%20MALICIOUS%20LIFE.png</image:loc><image:caption>46MALICIOUSLIFE</image:caption><image:title>46MALICIOUSLIFE</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/stitcher-podcast-player-1.png</image:loc><image:caption>stitcherpodcastplayer1</image:caption><image:title>stitcherpodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ran-levi-headshot.jpg</image:loc><image:caption>ranleviheadshot</image:caption><image:title>ranleviheadshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Apple-profile-400x400_.jpg</image:loc><image:caption>Appleprofile400x400</image:caption><image:title>Appleprofile400x400</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/image8.png</image:loc><image:caption>image8</image:caption><image:title>image8</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-230-Card.png</image:loc><image:caption>MLEp230Card</image:caption><image:title>MLEp230Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious%20life-podcast%20(1).png</image:loc><image:caption>Maliciouslifepodcast1</image:caption><image:title>Maliciouslifepodcast1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/spotify-podcast-player-1.png</image:loc><image:caption>spotifypodcastplayer1</image:caption><image:title>spotifypodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/icons/podcasts/rss-podcast-player-1.png</image:loc><image:caption>rsspodcastplayer1</image:caption><image:title>rsspodcastplayer1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-10-03</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/hse-ransomware-attack-all-you-need-to-know</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/TEISS%20logo-4.png</image:loc><image:caption>TEISSlogo4</image:caption><image:title>TEISSlogo4</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2021-05-19</lastmod></url><url><loc>https://www.cybereason.com/blog/reimagining-the-soc-a-lesson-from-the-military-on-9/11</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-logo-yellow-bg--top-badge.png</image:loc><image:caption>crlogoyellowbgtopbadge</image:caption><image:title>crlogoyellowbgtopbadge</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-09-13T114247.790-1.png</image:loc><image:caption>blogposttext20220913T1142477901</image:caption><image:title>blogposttext20220913T1142477901</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Dan-Verton-bio-pic.jpg</image:loc><image:caption>DanVertonbiopic</image:caption><image:title>DanVertonbiopic</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(68).png</image:loc><image:caption>blogposttext68</image:caption><image:title>blogposttext68</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20-%202022-08-05T074007.547.png</image:loc><image:caption>blogposttext20220805T074007547</image:caption><image:title>blogposttext20220805T074007547</image:title></image:image><lastmod>2022-09-14</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/what-should-be-on-the-next-presidents-cyberagenda</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/CIO-Today2.png</image:loc><image:caption>CIOToday2</image:caption><image:title>CIOToday2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-launches-its-predictive-ransomware-protection-solution-enterprise-grade-prevention-to-end-ransomware-attacks</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2021-11-17</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/karishma-asthana</loc><image:image><image:loc>https://www.cybereason.com/hubfs/IMG_8994.jpg</image:loc><image:caption>IMG8994</image:caption><image:title>IMG8994</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(8)-1.png</image:loc><image:caption>CybereasonBlogTemplate81</image:caption><image:title>CybereasonBlogTemplate81</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/XDR_Immunity.png</image:loc><image:caption>XDRImmunity</image:caption><image:title>XDRImmunity</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(64).png</image:loc><image:caption>blogposttext64</image:caption><image:title>blogposttext64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(74).png</image:loc><image:caption>blogposttext74</image:caption><image:title>blogposttext74</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(91).png</image:loc><image:caption>blogposttext91</image:caption><image:title>blogposttext91</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(94)-1.png</image:loc><image:caption>blogposttext941</image:caption><image:title>blogposttext941</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(24).png</image:loc><image:caption>blogposttext24</image:caption><image:title>blogposttext24</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Copy%20of%20BLOG%20%20SOCIAL%20SET%20-%20News%20(20)-1.png</image:loc><image:caption>CopyofBLOGSOCIALSETNews201</image:caption><image:title>CopyofBLOGSOCIALSETNews201</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-3.png</image:loc><image:caption>CybereasonBlogTemplate53</image:caption><image:title>CybereasonBlogTemplate53</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text-1.png</image:loc><image:caption>blogposttext1</image:caption><image:title>blogposttext1</image:title></image:image><lastmod>2021-10-20</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-receives-highest-score-in-current-offering-category-in-endpoint-detection-response-q1-2020-report-by-independent-research-firm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2020-12-11</lastmod></url><url><loc>https://www.cybereason.com/press/cybereason-named-a-forbes-2019-next-billion-dollar-startup</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2021-06-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/worst-hackers-avoid-attacking-eastern-european-countries-reports</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Fox%20News%20logo.png</image:loc><image:caption>FoxNewslogo</image:caption><image:title>FoxNewslogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><lastmod>2021-06-22</lastmod></url><url><loc>https://www.cybereason.com/blog/leveraging-the-xdr-advantage-in-the-midst-of-a-pandemic</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(5)-2.png</image:loc><image:caption>CybereasonBlogTemplate52</image:caption><image:title>CybereasonBlogTemplate52</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Profile-1.jpg</image:loc><image:caption>Profile1</image:caption><image:title>Profile1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Blog%20Template%20(4)-3.png</image:loc><image:caption>CybereasonBlogTemplate43</image:caption><image:title>CybereasonBlogTemplate43</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/EDR_XDR.png</image:loc><image:caption>EDRXDR</image:caption><image:title>EDRXDR</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2022-01-27</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/fbi-darkside-ransomware-used-in-colonial-pipeline-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Databreachtoday%20logo-3.png</image:loc><image:caption>Databreachtodaylogo3</image:caption><image:title>Databreachtodaylogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><lastmod>2021-05-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/researcher-spots-firms-behind-osx.pirrit-adware</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/In%20The%20News%20-%20Publisher%20Logos/SC-Magazine.png</image:loc><image:caption>SCMagazine</image:caption><image:title>SCMagazine</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2017-12-21</lastmod></url><url><loc>https://www.cybereason.com/blog/hospital-video-blog</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/fred-o-connor.jpg</image:loc><image:caption>fredoconnor</image:caption><image:title>fredoconnor</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/ML-Ep-232-Card.png</image:loc><image:caption>MLEp232Card</image:caption><image:title>MLEp232Card</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Feature%20Images/Video-banner.jpg</image:loc><image:caption>Videobanner</image:caption><image:title>Videobanner</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/ML146_2.png</image:loc><image:caption>ML1462</image:caption><image:title>ML1462</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><lastmod>2017-12-28</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/expect-chinas-military-exercises-to-accompany-real-cyber-warfare</loc><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/CyberSec%20Asia%20logo-3.png</image:loc><image:caption>CyberSecAsialogo3</image:caption><image:title>CyberSecAsialogo3</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><lastmod>2022-08-17</lastmod></url><url><loc>https://www.cybereason.com/blog/threat-alert-gootloader-seo-poisoning-and-large-payloads-leading-to-compromise</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/activemq-blog-featured.png</image:loc><image:caption>activemqblogfeatured</image:caption><image:title>activemqblogfeatured</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Threat-Alert-GootLoader-SEO-Poisoning.png</image:loc><image:caption>ThreatAlertGootLoaderSEOPoisoning</image:caption><image:title>ThreatAlertGootLoaderSEOPoisoning</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/threat-alert-DJvu-variant-featured-image.png</image:loc><image:caption>threatalertDJvuvariantfeaturedimage</image:caption><image:title>threatalertDJvuvariantfeaturedimage</image:title></image:image><lastmod>2023-08-08</lastmod></url><url><loc>https://www.cybereason.com/resources/the-right-roles-for-siem-and-edr</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/GettyImages-955010382.jpg</image:loc><image:caption>GettyImages955010382</image:caption><image:title>GettyImages955010382</image:title></image:image><lastmod>2019-03-26</lastmod></url><url><loc>https://www.cybereason.com/blog/new-ursnif-variant-turns-to-cryptocurrency-as-banks-become-more-secure</loc><image:image><image:loc>https://www.cybereason.com/hubfs/CR_Owl_Web_Mono@3x%202.png</image:loc><image:caption>CROwlWebMono3x2</image:caption><image:title>CROwlWebMono3x2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(4)-1.png</image:loc><image:caption>pastedimage041</image:caption><image:title>pastedimage041</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200-2.png</image:loc><image:caption>pastedimage02</image:caption><image:title>pastedimage02</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(2).png</image:loc><image:caption>Vs2</image:caption><image:title>Vs2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Vs%20(6).png</image:loc><image:caption>Vs6</image:caption><image:title>Vs6</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/pasted%20image%200%20(3)-1.png</image:loc><image:caption>pastedimage031</image:caption><image:title>pastedimage031</image:title></image:image><lastmod>2019-12-19</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/chinese-hackers-compromised-telecom-firms-researchers-say</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Bloomberg%20News%20logo-1.png</image:loc><image:caption>BloombergNewslogo1</image:caption><image:title>BloombergNewslogo1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><lastmod>2021-08-04</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/paul-bottomley</loc><image:image><image:loc>https://www.cybereason.com/hubfs/cybereason-unified-threat-hunting-and-investigation-1.png</image:loc><image:caption>cybereasonunifiedthreathuntingandinvestigation1</image:caption><image:title>cybereasonunifiedthreathuntingandinvestigation1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-twitter.svg</image:loc><image:caption>iconsocialgraytwitter</image:caption><image:title>iconsocialgraytwitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(47).png</image:loc><image:caption>blogposttext47</image:caption><image:title>blogposttext47</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/headshot.jpeg</image:loc><image:caption>headshot</image:caption><image:title>headshot</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/blog-post-text%20(119).png</image:loc><image:caption>blogposttext119</image:caption><image:title>blogposttext119</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/machine-timeline-enhancements.png</image:loc><image:caption>machinetimelineenhancements</image:caption><image:title>machinetimelineenhancements</image:title></image:image><lastmod>2022-03-18</lastmod></url><url><loc>https://www.cybereason.com/xdr-for-cloud-workloads/webinar/us/030922</loc><image:image><image:loc>https://www.cybereason.com/hubfs/yonatan-cropped-hexagon.png</image:loc><image:caption>yonatancroppedhexagon</image:caption><image:title>yonatancroppedhexagon</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White-Yellow.png</image:loc><image:caption>cybereasonlogovectorLBcoWhiteYellow</image:caption><image:title>cybereasonlogovectorLBcoWhiteYellow</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/cr-bg-buildings-vertical--cwpp.jpg</image:loc><image:caption>crbgbuildingsverticalcwpp</image:caption><image:title>crbgbuildingsverticalcwpp</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/featured-images/cwpp-webinar-featured-image.png</image:loc><image:caption>cwppwebinarfeaturedimage</image:caption><image:title>cwppwebinarfeaturedimage</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cody-queen.png</image:loc><image:caption>codyqueen</image:caption><image:title>codyqueen</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2022-03-09</lastmod></url><url><loc>https://www.cybereason.com/resources/five-clear-steps-to-enhance-secops-with-mitre-attack</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/cards/attack-simulations-home-card-squared.png</image:loc><image:caption>attacksimulationshomecardsquared</image:caption><image:title>attacksimulationshomecardsquared</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/City%20Top%20View_v2.png</image:loc><image:caption>CityTopViewv2</image:caption><image:title>CityTopViewv2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/backgrounds/wireframes/cr-bg__why-inspektus-wireframe-01.png</image:loc><image:caption>crbgwhyinspektuswireframe01</image:caption><image:title>crbgwhyinspektuswireframe01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><lastmod>2020-06-03</lastmod></url><url><loc>https://www.cybereason.com/blog/authors/emmy-linder</loc><image:image><image:loc>https://www.cybereason.com/hubfs/IWD%20blog%20(1).png</image:loc><image:caption>IWDblog1</image:caption><image:title>IWDblog1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/icon-social-gray-linkedin.png</image:loc><image:caption>iconsocialgraylinkedin</image:caption><image:title>iconsocialgraylinkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20-%20Emmy%20Linder.png</image:loc><image:caption>CybereasonEmmyLinder</image:caption><image:title>CybereasonEmmyLinder</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><lastmod>2021-04-11</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/log4j-updates-flaw-challenges-global-security-leaders</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Inforisktoday%20logo-1.png</image:loc><image:caption>Inforisktodaylogo1</image:caption><image:title>Inforisktodaylogo1</image:title></image:image><lastmod>2022-01-29</lastmod></url><url><loc>https://www.cybereason.com/blog/what-is-code-red-worm</loc><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/cr-blog-icon--search-dark-gray.png</image:loc><image:caption>crblogiconsearchdarkgray</image:caption><image:title>crblogiconsearchdarkgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Blog%20Author%20Images/Lital%20Asher-Dotan.jpeg</image:loc><image:caption>LitalAsherDotan</image:caption><image:title>LitalAsherDotan</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg</image:loc><image:caption>facebookgray</image:caption><image:title>facebookgray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-White%20(1).png</image:loc><image:caption>cybereasonlogovectorLBcoWhite1</image:caption><image:title>cybereasonlogovectorLBcoWhite1</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Heroes/GnA-01.jpg</image:loc><image:caption>GnA01</image:caption><image:title>GnA01</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg</image:loc><image:caption>twittergray</image:caption><image:title>twittergray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/image6-4.png</image:loc><image:caption>image64</image:caption><image:title>image64</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/levelblue/cybereason-logo-vector-LBco-Black.png</image:loc><image:caption>cybereasonlogovectorLBcoBlack</image:caption><image:title>cybereasonlogovectorLBcoBlack</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg</image:loc><image:caption>linkedingray</image:caption><image:title>linkedingray</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode%20(20).png</image:loc><image:caption>MaliciousLifeepisode20</image:caption><image:title>MaliciousLifeepisode20</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/dam/images/images-web/logos/cr-brand/cr-malicious-life-logo-v2.png</image:loc><image:caption>crmaliciouslifelogov2</image:caption><image:title>crmaliciouslifelogov2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Malicious-Life-episode-1.png</image:loc><image:caption>MaliciousLifeepisode1</image:caption><image:title>MaliciousLifeepisode1</image:title></image:image><lastmod>2022-06-08</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/biden-tells-putin-to-crackdown-on-ransomware.-what-are-the-odds-he-will</loc><image:image><image:loc>https://www.cybereason.com/hubfs/NPR%20logo-2.png</image:loc><image:caption>NPRlogo2</image:caption><image:title>NPRlogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><lastmod>2021-06-18</lastmod></url><url><loc>https://www.cybereason.com/in-the-news/valak-re-tooled-now-hits-microsoft-exchange-servers-behaviour-change-monitoring-advised</loc><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Files/images/cr-owl-logomobile.png</image:loc><image:caption>crowllogomobile</image:caption><image:title>crowllogomobile</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/twitter.svg</image:loc><image:caption>twitter</image:caption><image:title>twitter</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Newsroom_Blog_Background.jpg</image:loc><image:caption>NewsroomBlogBackground</image:caption><image:title>NewsroomBlogBackground</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/facebook.svg</image:loc><image:caption>facebook</image:caption><image:title>facebook</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/linkedin.svg</image:loc><image:caption>linkedin</image:caption><image:title>linkedin</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/instagram.svg</image:loc><image:caption>instagram</image:caption><image:title>instagram</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/SC%20Magazine%20logo-2.png</image:loc><image:caption>SCMagazinelogo2</image:caption><image:title>SCMagazinelogo2</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/Cybereason%20Logos/CR%20Logo%20copy.png</image:loc><image:caption>CRLogocopy</image:caption><image:title>CRLogocopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/social-icons/youtube.svg</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/LOGO-Web-Owl-Mono-Copy.png</image:loc><image:caption>LOGOWebOwlMonoCopy</image:caption><image:title>LOGOWebOwlMonoCopy</image:title></image:image><image:image><image:loc>https://www.cybereason.com/hubfs/cr-logo.svg</image:loc><image:caption>crlogo</image:caption><image:title>crlogo</image:title></image:image><lastmod>2020-06-12</lastmod></url></urlset>